This document describes how to create a custom Active Directory certificate template on a Windows server and then configure the HYPR Workforce Access Client application to use the certificate when a user registers or authenticates on a Windows workstation. There are three main steps in this process:
Before you begin, verify that:
- Active Directory Certificate Services are deployed within the domain
- Your account on the Windows server has privileges to modify the Certificate Authority settings
- The HYPR Workforce Access Client application is already installed on the workstation
- Log into the Windows server that performs the Certificate Authority role, either directly or via a remote desktop client.
- Open the Microsoft Management Console (MMC).
- In the console, select File>Add/Remove Snap-in...
- Use the Add > button to add Certificate Templates to the list of selected snap-ins then click OK to save the change.
- Open the Certificate Templates snap-in, right-click on the User template, and select Duplicate Template.
- In the Properties of New Template window, go to the General tab and change the following settings:
Template display name
Any name that will let you identify this as a HYPR template. For example:
By default, MMC will use the Template display name without any spaces. You can change the name, but make a note of the value since you’ll need it later to set up the HYPR Workforce Access client on each workstation.
Publish certificate in Active Directory
You can leave this either checked or unchecked
- Go to the Request Handling tab and change the following settings:
Signature and encryption
Allow private key to be exported
Prompt the user during enrollment
- Go to the Subject Name tab and change the following settings:
Build from this Active Directory information
Subject name format
User principal name (UPN)
- Go to the Extensions tab and edit Application Policies so that the only listed policies are Client Authentication and Smart Card Logon. (Remove any default policies as necessary.)
- Go to the Cryptography tab and verify the Minimum key size. HYPR supports a minimum of 1024-bit encryption but recommends you use 2048-bit RSA private keys.
- Select OK to close the Properties of New Template window and create the template.
- On the Windows Server, open the Certification Authority console.
- In the left navigation pane, right-click on the machine name and select Properties.
- Go to the Policy Module tab, click the Properties... button, and make sure the "Follow the settings in the certificate template, if applicable. Otherwise, automatically issue the certificate" option is checked for Request Handling.
- Back in the left navigation pane, right-click on Certificate Templates and select New>Certificate Template to Issue.
- In the Enable Certificate Templates list, locate the HYPR certificate template you created above. Highlight the template name and click OK to publish it.
To configure HYPR to use the new certificate, you need to modify HYPR’s Certificate Template registry setting on each workstation where the HYPR Workforce Access Client application is installed.
This example uses Regedit to set the value locally. Please refer to the Installation and Configuration page for instructions on how to update the registry as part of a silent installation.
- Open Regedit on the workstation where the HYPR Workforce Access Client is installed.
Important: Before making any changes, back up the registry for safety.
- Locate the following registry key:
HKEY_LOCAL_MACHINE\SOFTWARE\HYPR Workforce Access
- Edit the Certificate Template value and change the data field to the name of the HYPR certificate template you created. Make sure you use the template name (for example, “hyprwin” without spaces), not the template display name (“HYPR Windows”).
- Close Regedit and restart the computer.
- Open the HYPR Workforce Access Client and register a new device to confirm the registration is using the new certificate template.
Updated 24 days ago