Skip to main content
Version: 10.7.1

HYPR Windows Passwordless Login using Smartcard Playbook

Introduction

What is a smartcard authentication?

Public-key and certificate-based authentication are two common alternatives to password-based authentication. Instead of using a password, your identity is verified through the use of public and private keys. A certificate is a digital document that identifies an individual, server, company, or other entity and links that identity to a public key. Similar to a driver's license or passport, a certificate serves as widely accepted proof of identity. Public-key cryptography relies on certificates to prevent impersonation.

In smart card authentication, your credentials—public and private keys, along with a certificate—are stored on a smart card. These credentials can only be used once the card is inserted into a reader and the correct PIN is entered. Since this method requires both a physical device (the smart card) and knowledge of the PIN, it qualifies as two-factor authentication.

HYPR provides a certificate-based authentication for Windows and MAC workstations.

Products: HYPR Authenticate app and Workforce Access Client

Features: Passwordless MFA workstation login, Remote Lock, RDP, roaming user

Benefits

  • Reduces the attack surface
  • Makes login faster and simpler
  • Helps avoid business risk
  • Increases user productivity
  • Lowers help desk support costs
  • Reduces employee onboarding times

Expected Outcome

To successfully install, configure and use HYPR WFA client on workstations for passwordless authentication, remote lock, Remote Desktop Login and as a Roaming User

Preparing for the solution deployment

Preparing for the Solution Deployment | HYPR Identity Assurance

Platform Before deploying the HYPR Passwordless solution, ensure that the environment, identity infrastructure, and endpoint configurations are fully prepared. Completing the steps below helps avoid installation failures, authentication issues, and support escalations during rollout.

(Windows) HYPRReady Diagnostics Tool | HYPR Identity Assurance

Platform Before deployment, download and run the HYPRReady Tool on representative Windows endpoints to validate readiness.

Ensure the following checks pass:

  • Supported Windows OS version and patch level

  • Network connectivity to the HYPR tenant (HTTPS and WebSocket endpoints)

  • Proper proxy configuration and TLS inspection compatibility

  • Availability of required Windows services and cryptographic providers

  • Device join state (Azure AD Joined, Hybrid Joined, or Domain Joined)

Use the diagnostics output to remediate any failures prior to client installation.


Getting Started | HYPR Identity Assurance Platform

Confirm that the HYPR tenant and core platform components are ready:

  • HYPR Control Center access is available for administrators

  • Required administrator roles are assigned

  • HYPR tenant URL (rpUrl) and Application ID (appId) are identified

  • Installation tokens or enrollment methods are defined

  • Mobile application availability is confirmed for end users (iOS / Android)

At this stage, define whether the deployment will follow:

  • Quick Install (non–domain joined endpoints)

  • Advanced Install (Active Directory–integrated endpoints)


Passwordless Client Config | HYPR Identity Assurance Platform

Prepare the Passwordless Client configuration before deployment:

  • Create and validate the hypr.json configuration file

  • Define required parameters such as:

    • Relying Party URL

    • Application ID

    • Installation or registration behavior

  • Confirm authentication policies (PIN requirements, biometric enforcement)

  • Validate offline authentication and recovery options

This configuration should be finalized and tested prior to mass deployment.


Desktop Client | HYPR Identity Assurance Platform

Prepare endpoints and deployment tooling for the HYPR Desktop Client:

  • Confirm endpoints meet minimum hardware and OS requirements

  • Ensure users or deployment accounts have sufficient permissions

  • Validate that endpoint protection and firewall rules allow HYPR services

  • Decide on deployment method:

    • Intune / MDM

    • SCCM / Configuration Manager

    • Manual or scripted installation

For enterprise deployments, pre-package the client with configuration files and test silent installation behavior.


Workstation Settings | HYPR Identity Assurance Platform

Configure Workstation Settings in the HYPR Control Center to match enterprise security requirements:

  • Authentication behavior (lock, unlock, login)

  • PIN complexity and retry limits

  • Biometric enforcement policies

  • Device trust and recovery options

Ensure workstation policies are published and validated before user onboarding begins.

Requirements Analysis | HYPR Authenticate Passwordless Client

This section outlines the certificate infrastructure and Active Directory requirements necessary to support HYPR Passwordless authentication using Microsoft Certificate Services (AD CS). These requirements apply to Advanced Installations and environments leveraging certificate-based authentication.


Microsoft Certificate Services (AD CS) | HYPR Identity Assurance

Platform A functioning Microsoft Active Directory Certificate Services (AD CS) deployment is required to issue authentication certificates for HYPR Passwordless users.

Ensure the following prerequisites are met:

  • An Enterprise Certification Authority (CA) is deployed and operational

  • The CA is integrated with Active Directory

  • The CA supports user authentication certificates

  • Certificate auto-enrollment is enabled for target users or devices

  • CRL and OCSP endpoints are reachable by domain controllers and endpoints

The CA must be trusted by all domain-joined systems participating in passwordless authentication.


HYPR Certificate Template | HYPR Identity Assurance Platform

A dedicated HYPR certificate template must be created and published in AD CS to support passwordless authentication.

Template requirements:

  • Based on a Smart Card Logon or User Authentication template

  • Includes the Client Authentication and Smart Card Logon EKUs

  • Uses a compatible cryptographic provider (KSP recommended)

  • Supports strong key sizes and modern algorithms (e.g., RSA 2048 or ECC)

Configuration considerations:

  • Allow enrollment permissions for target user groups

  • Enable auto-enrollment where applicable

  • Ensure the Subject Name is correctly populated from Active Directory

  • Validate template compatibility with HYPR client workflows

This template is used by HYPR to issue certificates that represent the user’s passwordless credential.


Domain Controller Certificate Supporting Smart Card Authentication |

HYPR Identity Assurance Platform All domain controllers participating in passwordless authentication must have a valid domain controller certificate that supports smart card authentication.

Certificate requirements:

  • Issued to each domain controller from the enterprise CA

  • Contains the Smart Card Logon EKU

  • Includes Server Authentication where required

  • Is trusted by domain members and endpoints

  • Has a valid and reachable CRL distribution point

Validation steps:

  • Confirm certificates are present in the Local Computer certificate store on each DC

  • Verify smart card logon functionality using built-in Windows tools

  • Ensure domain controllers can validate user authentication certificates issued by the HYPR template

Without a smart card–capable DC certificate, certificate-based logon attempts will fail even if user certificates are issued correctly.

Configuring Control Center for HYPR Passwordless Client

Access Control Center using admin credentials and select standard mode.

Navigate to Workstation settings tab and select Workstation Settings

Use the Workstation Settings screen to enable and configure optional HYPR workstation login features. These changes by default affect the HYPR Default Workstation Application and will be used as the default settings for any newly created RP Applications. To manually change Workstation Settings for individual RP Applications, you must be in Control Center Advanced Mode > Select an Application > Application Configuration > Workstation Settings. The UI is identical to what is described in this article.

Workstation settings
API calls

Workstation Settings can be administered using the following RP Application > Workstation API calls:

Require User Presence for Registration

Windows Only

This setting doesn't apply when the Single Registration Web-to-Workstation flow is enabled since the registration happens on the Web

If enabled, the Require User Presence feature will prompt users to complete their workstation account authentication (PIN, Security Key, smart card, etc.) as an extra security step when registering a mobile device. While this is enabled, the default one-minute timeout to allow for scanning the QR code is extended to three minutes.

Require user presence setting

In-App Logs Submission

Enables logs to be sent directly to the tenant logs from inside the Application. The same information is also sent directly to HYPR Customer Support when users do so. In the Support dialogs, the Company Display Name from General Settings will only be shown for the App if this feature is ON.

Mac users have some unique options surrounding this feature. See also User Experience: Contact Support for how this setting affects the user experience on HYPR Passwordless for Mac.

In-app logs submission setting

Enable Security Key

If enabled, the Enable Security Key feature allows users to register a security key or smart-card via the HYPR Passwordless client and use it for workstation authentication as an alternative to their mobile device.

Related Topics:

Enable security key setting

Roaming Users

Windows Only

If enabled, the Roaming Users feature allows users to pair their mobile device once then access any domain-joined desktop by scanning a QR code displayed on the login screen. For a description of the user experience, see Logging In As a Roaming User.

Roaming users setting

Users Must Pair Again to Use This Feature!

After the Roaming Users feature is activated in the Control Center, users will need to re-register their mobile devices with the HYPR Passwordless application.

HYPR supports Single Registration: Web-to-workstation operations for roaming users. Additional Virtual Desktop Infrastructure (VDI) configuration must be performed; the following limitations apply:

  • If a user has multiple accounts registered, the user cannot select which account to use when authenticating

  • Offline and Recovery PINs are not generated on the workstations for roaming users

Enable Offline Mode

Offline Mode allows users to perform a PIN-based login when they don't have an internet connection for either their mobile device or the workstation itself. For a description of the user experience, see Unlocking While Offline.

Offline mode setting

In addition to enabling/disabling Offline Mode, you can set the following parameters:

ParameterDescription
PIN LengthThe number of alphanumeric characters users will need to enter on the workstation login screen when their mobile device or the workstation is offline (6-13).
Number of Offline PINsThe number of times a user can access their machine while offline (10-25). Users are warned they're running low on PINs when they have 20% remaining and the PIN count is reset upon successful completion of a normal online login.
PIN Display TimeoutNumber of seconds the PIN will be displayed on the user's smartphone (30-300).
Offline PIN PromptNumber of seconds before the offline PIN is displayed when the user is online.
Offline Access DaysThe number of consecutive days a user can login while offline (7-90). Users are warned they're running low on days when they have 20% remaining and the offline access day count is reset upon successful completion of a normal online login.

Recovery Mode

Recovery Mode allows users to perform a PIN-based login when they don't have access to their mobile device. For more information, see Unlocking with a Recovery PIN for the user experience this enables.

Recovery mode setting

In addition to enabling/disabling Recovery Mode, you can set the following parameters:

ParameterDescription
Recovery PIN LengthThe number of alphanumeric characters users will need to enter on the workstation login screen when they request a Recovery PIN (6-13). Default: 8
Recovery PIN CounterThe number of Recovery PINs generated during the pairing process (1-10). Default: 5
Recovery PIN LifespanNumber of hours for which the Recovery PIN is valid (24-72). The timer starts when the user first logs into the workstation using the PIN. Default: 72

Security Key Recovery Mode

Windows Only

Enables a recovery PIN for security key or smart-card users who do not have access to their device and need to login. See Pairing with a Security Key for security key or smart-card PIN management.

Non-exportable Private Keys

If non-exportable private keys are enabled for the HYPR Passwordless client, Security Key Recovery Mode will be disabled automatically.

Security key recovery mode setting

In addition to enabling/disabling Security Key Recovery Mode, you can set the following parameters:

ParameterDescription
Recovery PIN LengthThe number of alphanumeric characters users will need to enter on the workstation login screen when they request a Recovery PIN (6-13). Default: 8
Recovery PIN CounterThe number of Recovery PINs generated during the pairing process (1-10). Default: 5
Recovery PIN LifespanNumber of hours for which the Recovery PIN is valid (24-72). The timer starts when the user first logs into the workstation using the PIN. Default: 72

Use the Desktop Client screen in the Workstation section to select and download the HYPR Passwordless client installers for Windows and Mac.

Desktop client download

Downloading the HYPR Passwordless Client Installer

One-Time Only

For both the Windows and macOS installers, the button to download the Passwordless client will at first be labeled Get Started on [Windows or Mac]. Once you have chosen which type of installation will download, the button for that installer changes to Download for [Windows or Mac].

  1. Click the Download for... button for the platform you're using (Windows or Mac).

  2. Choose your installation type: Quick (Non-Domain-Joined) or Advanced (Domain-Joined).

    • To continue with a Quick installation, click Choose in the left pane and continue with the next step

    • If you want a more configurable client, click Contact Us on the Advanced pane, and await further instructions

Choose installer type
  1. Confirm the requirements to start the download.
Confirm download requirements
  1. Once the installer file has finished downloading, follow the on-screen steps to start the install process

Installing Passwordless client with the UI

Passwordless for Windows

To install the HYPR Passwordless client application on Windows, run HYPR installer as follows:

  1. Open the downloaded HYPR Installer-WINDOWS.zip package and extract the WorkforceAccess_x64.msi file and hypr.json configuration file to the same folder.

Full Extraction

Make sure you extract the files rather than simply opening the .zip and running WorkforceAccess_x64.msi directly. The installer will start but won't be able to read the hypr.json configuration file.

Extract installer package
  1. Double-click the HyprPasswordless_x64-<version>.msi file to start the installation.
Installer wizard
  1. Click Next to display the EULA.
EULA
  1. If the End User Agreement Terms are acceptable, select the checkbox and click Next.

  2. If you're performing a Quick Install, you don't need to provide any more parameters. You can skip this step.

If you're performing an Advanced Install, you'll see the Environment Setting dialog.

Environment setting dialog
FieldValue
Relying Party URLThe URL for the HYPR server. Corresponds to the 'rpUrl' manual installation parameter.
Application IDThe unique identifier for the HYPR RP Application. Corresponds to the 'rpAppId' manual installation parameter.
Public Key PinningThe PIN hash used for SSL Pinning on the workstation. Corresponds to the 'pinningHash' manual installation parameter.
Certificate TemplateThe name of the Active Directory certificate template. Corresponds to the 'certTemplate' manual installation parameter.
Support EmailThe email for users to contact corporate support. Corresponds to the 'supportEmail' manual installation parameter.
Install TokenThe HYPR workstation installation token. Corresponds to the 'installToken' manual installation parameter.
Add to Start MenuAdd a HYPR Passwordless shortcut to the Windows Start Menu.
Non-persistent VDIIf your site uses stateless Virtual Desktop Infrastructure, toggle this setting On.
Disable Password LoginToggle On to hide the password login/unlock option on Windows. Corresponds to the registry entry \HKEY_LOCAL_MACHINE\SOFTWARE\HYPR Workforce Access\Config\Disable Password Login.

Value Add

Normally the values on the Environment Setting screen are pre-populated from the hypr.json configuration file (see Installing Manually) and shouldn't be changed. For an Advanced Install, HYPR Support may also provide you with additional values to use here.

  1. Click Next to continue.
Continue installation
  1. Click Install to begin the installation.
Install
  1. When the installation is done, click Finish.

  2. Click Yes to restart now or No if you plan to manually restart later.

Restart prompt

Give It the Boot

HYPR Passwordless may not function fully if opened before a restart.

If you're deploying across your organization using a desktop management tool or using some other mechanism that requires a silent install, the HYPR Passwordless client for Windows can be also installed from the command line. For more information, please see

Install via msiexec (silent) | HYPR Identity Assurance Platform

Install via msiexec (silent) | HYPR Identity Assurance Platform

You can deploy the HYPR Passwordless client on Windows without displaying the installation UI by using the msiexec command. This is ideal for automated deployments or tools like Intune/SCCM.

Windows Silent Install Steps

Option 1: Using hypr.json

  1. Place the hypr.json configuration file in the same folder as the HYPR .msi installer.

  2. Run the silent installation:

  3. msiexec.exe /qn /i WorkforceAccess_x64.msi

This installs the client using the parameters defined in hypr.json.

Option 2: Passing Parameters Inline

  1. Run msiexec with required installation parameters directly on the command line. For example:

  2. msiexec.exe /qn /i WorkforceAccess_x64.msi HYPRAPPID="HYPRDefaultWorkstationApplication"

  3. HYPRRP="https://yourtenant.hypr.com/rp"

  4. HYPRHASH="…pinning hash…"

  5. HYPRINSTALLTOKEN="…install token…"

  6. HYPRSUPPORT="support@example.com"

  7. Each parameter maps to a configuration property that the HYPR client needs to install correctly.

📝 Notes

  • Run this from an elevated command prompt (administrator).

  • The silent switch /qn suppresses all UI.

  • Parameters passed on the command line override any values in hypr.json.

Creating a Custom Certificate Template

This document describes how to create a custom Active Directory certificate template on a Windows server and then configure the HYPR Passwordless client application to use the certificate when a user registers or authenticates on a Windows or macOS workstation. There are three main steps in this process:

  • Create a Certificate Template on the Server

  • Issue the Certificate Template on the Server

  • Configure HYPR to Use the Certificate on the Workstation

Before you begin

Verify the following:

  • Active Directory Certificate Services are deployed within the domain

  • Your account on the Windows server has privileges to modify the Certificate Authority settings

  • The HYPR Passwordless client application is already installed on the workstation

OS-specific Templates

The custom certificate template requirements vary slightly between Windows and Mac, so if you have both types of workstations in your environment you'll need to create two templates. The instructions below indicate where there are differences.

API Calls

Workstation certificate operations appear under RP Applications > Workstation > Certificates in the HYPR Passwordless API.

For domain certificates, see these Control Center > Certificates calls.

Create a Certificate Template on the Server

  1. Log in to the Windows server that performs the Certificate Authority role, either directly or via a remote desktop client.

  2. Open the Microsoft Management Console (MMC).

  3. In the console, select File>Add/Remove Snap-in...

Add or remove snap-in
  1. Use the Add > button to add Certificate Templates to the list of selected snap-ins then click OK to save the change.
Add certificate templates snap-in
  1. (FOR WINDOWS) Open the Certificate Templates snap-in, right-click on the User template, and select Duplicate Template.
Duplicate template (Windows)

(FOR MAC) Open the Certificate Templates snap-in, right-click on the Smartcard User template, and select Duplicate Template.

Duplicate template (macOS)
  1. In the Properties of New Template window, go to the General tab and change the following settings:
ParameterValue
Template display nameAny name that will let you identify this as a HYPR template
Template nameBy default, MMC will use the Template display name without any spaces. In order to match the preconfigured template name used by the HYPR Passwordless client installer, we strongly suggest you use the following: hyprwin (for Windows) hyprmac (for macOS). If you prefer to use a different template name, be sure to make a note of the value since you'll need to manually change the HYPR Passwordless client configuration settings on each workstation.
Publish certificate in Active DirectoryYou can leave this either checked or unchecked
  1. Template properties
  2. Non-exportable Private Key Creation

  3. If you are creating a template for non-exportable private keys, stop here and continue below.

  4. (WINDOWS ONLY) Go to the Request Handling tab and change the following settings:

ParameterValue
PurposeSignature and encryption
Allow private key to be exportedChecked
Prompt the user during enrollmentSelected
  1. Request handling settings
  2. (WINDOWS ONLY) Go to the Subject Name tab and change the following settings:

ParameterValue
Build from this Active Directory informationChecked
Subject name formatNone
User principal name (UPN)Checked
  1. Subject name settings
  2. Important Security Patch Notice for Windows Server 2019 and 2022

  3. In January 2025, security patches were released for Windows Server 2019 and 2022. Unfortunately, one of these patches introduced an incompatible fix that caused issues with certificates containing empty 'Subject Name'.

  4. If you're running Domain Controllers on this patch version and cannot upgrade to a later security patch (February 2025 or later), Microsoft offers a Known Issue Rollback as a workaround. To apply this fix, please contact HYPR support for guidance.

  5. Additional Information

  6. When configuring Single Registration: Workstation-to-Web, the Email name must also be checked for the feature to function properly.

  7. Extensions settings
  8. (WINDOWS ONLY) Go to the Extensions tab and edit Application Policies so that the only listed policies are Client Authentication and Smart Card Logon. (Remove any default policies as necessary.)

Application policies
  1. (WINDOWS ONLY) Go to the Cryptography tab and verify the Minimum key size. HYPR supports a minimum of 1024-bit encryption but recommends you use 2048-bit RSA private keys.
Cryptography settings
  1. Select OK to close the Properties of New Template window and create the template.

Creating a Certificate Template for Non-exportable Private Keys

Start by completing Create a Certificate Template on the Server Steps 1-5; then return here to complete the process.

  1. (WINDOWS ONLY) Go to the Request Handling tab and change the following settings:
ParameterValue
PurposeSignature and smartcard logon
Allow private key to be exportedUnchecked
Prompt the user during enrollmentSelected
  1. Go to the Subject Name tab and change the following settings:
ParameterValue
Build from this Active Directory informationChecked
Subject name formatNone
User principal name (UPN)Checked
  1. (WINDOWS ONLY) Go to the Extensions tab and edit Application Policies so that the only listed policies are Client Authentication and Smart Card Logon. (Remove any default policies as necessary)

  2. (WINDOWS ONLY) On the Cryptography tab:

    • Minimum key size: HYPR supports a minimum of 1024-bit encryption but recommends you use 2048-bit RSA private keys

    • Provider Category: Select Key Storage Provider

    • Choose which cryptographic providers can be used for requests: Select Requests must use one of the following providers

    • Providers: Check Microsoft Smart Card Key Storage Provider

  3. Select OK to close the Properties of New Template window and create the template.

Issue the Certificate Template on the Server

  1. On the Windows server, open the Certification Authority console.

  2. In the left navigation pane, right-click on the machine name and select Properties.

Certificate authority properties
  1. Go to the Policy Module tab, click the Properties... button, and make sure the "Follow the settings in the certificate template, if applicable. Otherwise, automatically issue the certificate" option is checked for Request Handling.
Policy module settings
  1. Back in the left navigation pane, right-click on Certificate Templates and select New > Certificate Template to Issue.
Certificate template to issue
  1. In the Enable Certificate Templates list, locate the HYPR certificate template you created above. Highlight the template name and click OK to publish it.
Enable certificate templates

Configure HYPR to Use the Certificate on the Workstation

To configure HYPR to use the new certificate, you must modify the installation settings on each workstation where the HYPR Passwordless client application is installed.

Windows Workstations

On a Windows machine, you need to modify HYPR's Certificate Template registry settings.

Active Directory Note

If you named the template hyprwin as suggested above and your client installer hypr.json file was preconfigured by HYPR to use Active Directory, you shouldn't have to make any changes to the registry settings.

Use Regedit to set the registry value:

  1. Open Regedit on the workstation where the HYPR Passwordless client is installed.

important

Before making any changes, back up the registry for safety.

  1. Locate the following registry key:

HKEY_LOCAL_MACHINE\SOFTWARE\HYPR Workforce Access

  1. Edit the Certificate Template value and change the data field to the name of the HYPR certificate template you created. Make sure you use the template name (for example, "hyprwin" without spaces), not the template display name ("HYPR Windows").
Registry setting
  1. Close Regedit and restart the computer.

  2. Open the HYPR Passwordless client and register a new device to confirm the registration is using the new certificate template.

Pairing Device

Pairing a Mobile Device Using the Camera

  1. Open the HYPR Mobile App on the mobile device. The app may ask for permission to send notifications. Enabling these is optional.

  2. Start the HYPR Passwordless client on the workstation if it isn’t running already.

Start pairing
  1. Click Start Pairing in the HYPR Passwordless client. If you already have a device paired, click Pair New Device. You are presented with the option to pair a Smartphone or a Security Key.
Choose pairing type
  1. Select Smartphone and a QR code will appear in the dialog.
QR code prompt

The QR code expires after one minute (or three minutes if the Require User Presence for Registration feature is enabled), and an error message appears in the HYPR Passwordless client. If this happens, click Try Again.

  1. In the HYPR Mobile App, tap SCAN QR. If the HYPR Mobile App has already been used to pair this device before, the SCAN QR button may not appear; instead, tap the QR code icon above Add Account or Computer or in the upper right.
Scan QR in mobile app
Camera Ready?

The HYPR Mobile App may request permission to use the device’s camera. It’s important to grant this access; otherwise, scanning the QR code won’t be possible.

If you are unable to use your device's camera with your HYPR Mobile App, follow the instructions for using QR Fallback from the HYPR Passwordless Client.

  1. Orient the mobile device's camera to the QR code on the workstation screen.

  2. Select the authentication method to be used (face recognition, fingerprint recognition, PIN, etc.) whenever they unlock their workstation with this device. Authentication options vary according to the operating system and version of the device.

    • If users choose the PIN option, they’ll be asked to create a unique PIN for use with HYPR to unlock the workstation.

    • If they choose a biometric method, it must be set up already on the mobile device; on Android devices, select the Native option for biometric identification.

    • Depending upon the policy, you may see other methods of authentication. In this example, Face ID is enabled:

Select authentication method
  1. When prompted, use the chosen authentication method to finish pairing the device.

  2. (Windows only) If the Require User Presence feature is enabled in Control Center, authenticate using to the available methods on the workstation (PIN, security key, smart card, etc.), then click OK.

User presence prompt

For more information on this feature, see Device Registration and the Require User Presence Feature.

Paired device list
  1. Click Finish.

  2. (Optional but recommended) Test the process is working correctly. Please see Testing the New Device.

Test new device

Registering Security Keys

Pre requisites = Security keys with PIV support (Yubikey/Idemia)

Workstation Registration - Windows

  1. Open the HYPR Passwordless client.

  2. Click Start Pairing. You will be given a choice of pairing a Smartphone or pairing with a Security Key.

Start pairing
  1. Select Security Key to continue.
Select security key pairing

Connect First

Make sure you are connected to your secure network, or a warning will appear upon clicking Start Pairing. If this occurs, just connect to your secure network and click Try again.

  1. A browser dialog will prompt you to enter the PIN provided by your administrator or through the instruction guide which accompanied your device.
Enter PIN
  1. Enter the new PIN, then confirm it in the following field.

PIN Requirements

  • The PIN must be between 6 and 8 characters.

  • Users are not allowed to choose repeating digits in PINs, such as 111111

  • PINs may have no more than two consecutive numbers, such as 123987

  • Users are not allowed to choose repeating sequences in PINs, such as 121212 or 345345123849 is allowed

  • The PIN may not be left as the default value of 123456

  • The PIN may not be on any blocklist; for example, YubiKeys prohibit 159753

  • Valid characters for security key or smart‑card PINs: Numeric, AlphaNumeric, or Any. AlphaNumeric allows ASCII letters A–Z (case‑sensitive). Any allows ASCII 0x21–0x7E (no spaces). AlphaNumeric and Any are only available with Yubico keys

  1. Click Finish. Wait for enrollment to complete. You may be asked to authenticate to the workstation.

  2. Click Finish to view the paired device.

Paired device
  1. The HYPR Passwordless client returns to the main screen. The paired security key now appears here with Edit (pencil icon) and Delete (trash can icon) options.
Paired device list

Validating and testing the solution

Login using HYPR mobile App

Windows Login Screen 🡪 Open HYPR Mobile App 🡪 Click the registered Machines 🡪 Authenticate using Pin/Biometric 🡪 Access

Login to Windows using HYPR QR code authentication

Log in using QR code

Windows Login Screen -> Select Scan QR to Login

Scan QR to login prompt

Open your HYPR Mobile App and scan the QR code -> Authenticate with your PIN/Biometrics

QR login authentication

Login using Security Key

  1. Insert your paired Security Key into the USB port of the computer. Windows will offer the smart card icon as an additional login option. Click the smart card icon.
Smart card icon on login screen
  1. Type your PIN.
Tap security key
  1. Press Enter on your keyboard or click the submit arrow to login.

Offline Pin

HYPR's Offline Mode functionality gives users access to their workstation when their mobile device has no internet connection or the workstation is offline for some reason.

Generating an Offline PIN

There are several ways to perform authentication with Offline Mode, depending on which HYPR component is offline.

Groundwork

Users must have completed at least one successful authentication with the HYPR Mobile App before they can use Offline Mode.

If the Workstation Is Offline

If the HYPR Mobile App can't reach the workstation, the user is automatically offered the offline PIN option after five seconds have elapsed.

Remote lock

If the Mobile Device Is Offline

If the mobile device doesn't have an internet connection, the HYPR Mobile App displays a message on the main screen and takes the user directly to the offline PIN option when they tap the computer icon to log in.

Remote lock confirmation

If the Mobile Device Is Online

If the mobile device does have an internet connection, the user can manually request an Offline PIN if necessary by long-pressing the computer icon on the main screen.

RDP scenario

Get Acquainted

The Offline PIN button doesn't appear until the user has completed a successful authentication.

Using the Offline PIN to Log In

After generating a PIN on the mobile device, the user can enter it on the login screen to unlock the workstation.

RDP login prompt

Replenishing Offline PINs

The HYPR Mobile App will warn the user when they're running low on PINs, based on the allowable number of Offline PINs set via the Control Center Workstation Settings.

RDP authentication

The user must perform a successful online authentication to replenish the PINs on the mobile device. Once all the PINs have been exhausted, an error message displays on the mobile device.

The length of time an Offline PIN remains valid is determined by the Offline PINs set via the Control Center Workstation Settings.

Remote Desktop Login

Logging In to a Remote Desktop

To access a Windows remote desktop with HYPR, the user can choose to initiate the authentication from their mobile device or can scan a QR code on the workstation.

Accounts and Permissions

The account used to log in to the remote machine doesn't have to be the same as the one used to log in to the local machine. However, it must have the necessary access permissions on the remote machine to successfully connect.

It's also not necessary for the HYPR Passwordless client to be installed on the remote machine.

Device-initiated Authentication

If the account being used to connect to the remote machine has previously been paired with the local machine (see HYPR Passwordless and the HYPR Mobile App), the user may initiate the authentication from the HYPR Mobile App.

  1. Open the Remote Desktop Connection application.
Roaming user flow
  1. Enter the address of the remote computer and click Connect to show the Enter Your Credentials dialog.
Roaming user pairing
  1. WITHOUT CLICKING OK, initiate an authentication in the HYPR Mobile App by pressing the relevant computer icon as if logging in locally.
Roaming user login
  1. Wait for the connection to be established and accept the certificate-based authentication warning if necessary. (Check the Don't ask me again for connections to this computer box to skip this warning in future.)
Offline mode
  1. Wait for the Remote Desktop session to finish authenticating.

Scan QR to Log In for RDP

As an alternative to device-initiated authorization, the user can also scan a QR code on the local machine to unlock the remote machine.

Control Center Settings

The Scan QR to Log In feature is only available if Roaming Users is enabled in Control Center Workstation Settings. Roaming Users is disabled by default.

  1. Open the Remote Desktop Connection application.
Roaming user flow
  1. Enter the address of the remote computer and click Connect to show the Enter Your Credentials dialog.
Offline PIN
  1. Click More choices then click Scan QR to Login to expand the choices on the credentials screen.
Recovery flow
  1. Use Click here to expand QR code to reveal a larger scannable copy of the QR code.

  2. In the HYPR Mobile App, press the Scan to Unlock button and scan the QR code to log in.

Recovery flow (continued)
  1. If there's more than one domain-joined account stored on the mobile device, the HYPR Mobile App prompts the user to choose before presenting the identity authorization screen.
Recovery flow (continued)
  1. Wait for the Remote Desktop session to finish authenticating.

Roaming User Login

Users after registration can subsequently select the Scan QR to Login option on the login screen of any other domain-joined computer. It must have the HYPR Passwordless client installed. Users then simply scan the code with the HYPR Mobile App to access the machine.

Uninstall

Locking the workstation

  1. Tap the circle labeled with the desired workstation name.
Remove program
  1. A dialog appears: "This computer is already unlocked. Would you like to lock it?" Tap Yes.

  2. The workstation locks immediately. HYPR Mobile App displays a checkmark for confirmation, and returns to the main screen.

Best Practices

Lockout Settings

To provide additional security for Offline and Recovery PINs and prevent potential Brute Force Attacks, HYPR recommends enforcing the Lockout Settings in Active Directory for all user accounts. This policy locks a user account if the PIN is entered X number of times incorrectly.

You can learn more about configuring Lockout Settings in the Microsoft documentation.

You can also adjust the amount of allowed retry attempts for certain security keys or smart-cards. See Windows Installation instructions for full details on how to configure these options.

Log Security

By default, the HYPR Passwordless client allows user accounts without admin privileges to access the application log files. This is recommended practice during the initial deployment phase to ensure users can send log files to Admins or HYPR support for troubleshooting. However, after the initial deployment phase is over you should restrict log access to only accounts with local admin privileges.

Setting Log Levels

The HYPR Passwordless cient Log Level can be adjusted to limit the amount of data that is being logged. The following values can be used to adjust the logging:

  • 0 = No logging

  • 1 = Adds Fatal errors

  • 2 = Adds Errors

  • 3 = Adds Warnings

  • 4 = Adds more Information events

  • 5 = Default setting; debug logging

  • 6 = Increase to more verbose logging

Level 5 is enabled by default as this provides the needed amount of information for troubleshooting and technical support. Please be aware that reducing the logging level will significantly hinder HYPR's ability to provide technical support.

This log level can be adjusted as follows:

Windows

  • Edit the Windows registry's Log level entry located in HKEY_LOCAL_MACHINE\SOFTWARE\HYPR Workforce Access

Setting Log Access on Windows

For controlling access to the C:\Program Files\HYPR\Log folder, you must set parameters when installing the HYPR Passwordless client. See HYPR Registry Keys for more information regarding Windows installation parameters.

During Installation

For setting access to the logs folder on Windows during a fresh install, include the configuration parameter HYPRPROTECTLOGS (in MSI) or protectLogs (in hypr.json).

  • Set to "1" to make the folder readable only by users who belong to the built-in Administrators group.

  • Set to "0" (or omit the parameter) to make the folder readable and writable by all users.

Require User Presence for Registration

Additional measures can be implemented on HYPR Passwordless for Windows deployments to remove the risk of an attacker adding their mobile device while the user's workstation is unattended – for example, the user walks away but leaves the screen or device unlocked.

For additional user verification during workstation device registration, administrators can require users to re-authenticate during pairing to prove their identity. This is configurable in CC in Workstation Settings.

Additional Certificate Revocation Checks

In addition to native Windows' certificate revocation checks, HYPR Passwordless for Windows can be configured to attempt to perform a revocation check before the user gets logged into the workstation. This is configurable on HYPR Passwordless through the User Account Check setting.

Non-exportable Private Keys

For sites wishing to protect security key or smart-card users' private keys, HYPR Passwordless for Windows client allows an additional installation parameter (via both.json and .msi configuration) to cause private keys to be generated on the security key or smart-card, and to never leave that device. This option works alongside the existing mobile certificate template; however, it is mutually exclusive with Security Key Recovery Mode functionality, which depends on exportable private keys.

Deployment strategy and risk mitigation

Pilot Group selection, deployment and testing

Global Deployment using

  1. MDM or

  2. GPO

  3. Enforcing HYPR Passwordless Solution for workstations

  • Password resets consisting of large or complex password

  • Notice of HYPR registration completion to End users and enforcement of HYPR only login. Also Making HYPR the default cred provider

  • Disabling Password Authentication using GPO or registry or Active Directory. If HYBRID, Conditional Access can be used.

Logs and audit trail

Troubleshooting | HYPR Identity Assurance Platform

Workstation Troubleshooting | HYPR Identity Assurance Platform

HYPR Error Codes Table | HYPR Identity Assurance Platform

Audit Trail | HYPR Identity Assurance Platform

Event Descriptions | HYPR Identity Assurance Platform

Upgrading

HYPR Passwordless windows client can be upgraded with a silent install by running the updated binary via UI or via silent install similar to the Fresh Install.

No parameters or Json is required since existing values will be unaffected.

Reboot may or may not be required.

Removing the Passwordless client

Removing HYPR Passwordless client

Removing HYPR Passwordless client will delete all registry keys, installation artifacts, and HYPR user accounts from the target workstation. This action can be performed silently, with the installer user interface, or through Windows Control Panel.

Note

A restart of the workstation is required after the uninstall to complete removal.

Using the Command Line

Uninstall can be executed from the command line using msiexec.exe:

msiexec.exe /x WorkforceAccess_x64.msi

Using Windows Control Panel

  1. Navigate in the Control Panel to Apps > Apps and Features.

  2. From the menu of installed applications choose HYPR Passwordless and select the option to Uninstall.

Windows settings
  1. The uninstallation wizard will be initiated. Follow the prompts to continue with the uninstallation. Windows will require an administrative prompt to complete this uninstallation.

  2. Restart your workstation to complete the uninstallation.

Alternative using Intune or command prompt / powershell

Remove pairing

CMD prompt as admin example (note that the HYPR product code may be different for your environment):

MsiExec.exe /X{12CAE2E3-EDA7-40FF-A126-823F2BD6CFE3} /qn /norestart