Hideez Identity Cloud
  • Getting Started Guide
    • Key features of Hideez Identity Cloud
    • Quick Start Guide
      • The Hideez Desktop Client
      • Hideez Authenticator App
    • Tennant manegement
      • User Management
        • Passkey
        • Hideez Authenticator App
        • FIDO Security Key
        • Platform Authentication via Windows Hello
        • Password+OTP
      • Workstation management
  • PC Authorization
    • Passwordless Authorization
      • Active Directory
        • Setting Up the Active Directory Certification Authority
        • Setting Up Workstation Passwordless Logon Settings on Hideez Identity Cloud
      • Microsoft Entra ID
    • Password-based Authorization
  • INTEGRATIONS
    • SAML 2.0
      • GitHub Enterprise
      • Google Workspace
      • Okta
    • OIDC (OpenID Connect)
      • Services that support OIDC and their configuration as Client
    • WS-Federation
      • Login to Exchange Outlook Web Application and Exchange Admin Center via Hideez Identity Cloud
    • Active Directory On-Premises
      • Connect Active Directory to Hideez Identity Cloud
      • ADFS integration
        • Login to Microsoft Exchange OWA Using AD FS and Hideez Identity Cloud as a Third-Party IdP
    • Microsoft Entra ID
      • Synchronization and import employees from Microsoft Entra ID to Hideez Identity Cloud
      • Configuration of Hideez Cloud as an External Authentication Method for Microsoft Entra ID via OIDC
    • Chrome OS
  • USE CASES
    • Passkey Login
    • Hideez Authenticator App login
    • FIDO Security Key login
    • Platform login via Windows Hello
    • Password+TOTP login
  • SUPPORT
    • Get Support
    • FAQ
      • What to do if a user loses their key/device and cannot access the site?
      • Can a custom domain name be created for the tenant instead of the default one?
      • Why am I already logged in Hideez, and no authorization occurs when I access my web application?
      • How long does an open authorization session last?
      • How to log out of the web application?
      • Can I administer multiple tenants simultaneously?
      • Can there be multiple administrators for the Hideez Identity Cloud?
    • Glossary
  • Hideez Documentation Portal
Powered by GitBook
On this page
  1. PC Authorization
  2. Passwordless Authorization
  3. Active Directory

Setting Up Workstation Passwordless Logon Settings on Hideez Identity Cloud

PreviousSetting Up the Active Directory Certification AuthorityNextMicrosoft Entra ID

Last updated 1 month ago

Once you have created the appropriate template in the certification authority, you need to get the following settings:

  1. Cryptographic Service Provider Name

  2. Certificate Config

  3. Certificate Template ID

1. The first parameter (Cryptographic Service Provider Name) must be set to:

Microsoft Base Smart Card Crypto Provider

2. The second parameter (Certificate Config) is the name of the domain controller and the name of the certification authority:

The following command will help define these names. Run it from the command line:

certutil -config - -ping

Then you should get such a window:

Separated "CA" and "Computer" by an "\" in the settings on the Hideez Server.

3. To define the third parameter (Certificate Template ID), go to the domain controller, and do the following:

  • Open MMC and add the Certificate Templates snap-in (File > Add/Remove Snap-ins > Certificate Templates)

  • Right-click the created certificate template

  • Open Properties

  • Open Extensions tab

  • Select “Certificate Template Information”

The ID will be visible in the description below after "Object identifier":