By AD user group membership : All users included into a specially created Active Directory group will be required to perform two-factor authentication in order to login/unlock workstation This is the recommended option.Understand the types of 2-factor authentication (2FA) control policy you can implement with Rohos: Ensure that it could be used in Active Directory environment with centralized Key management and also with Remote Desktop connection if applicable.Ģ. Decide on the type of Authentication method you are going to use : hardware security device, OneTimePassword generator or UID RFID card. In this article we’ll describe the second case, where the Rohos Logon Key in installed over a AD domain to perform strong dual factor authentication for local console logon or remote desktop logon on Terminal Services environments with multiple TS hosts.ġ. Rohos Logon Key application supports standalone workstations as well as domain joined in Active Directory (AD). Enterprise-wide Google Auth, OTP configuration.Using Rohos Key Manager to configure authentication keys.Creating 2FA database with Rohos Management Tools.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |