Configure group policies for AD servers
After teams import a certificate into Active Directory (AD), they must still configure server resources for use with Advanced Server Access. Okta recommends teams place all Advanced Server Access-protected servers in a separate Organizational Unit (OU) from other resources on the domain. Teams can then centrally manage domain controllers and resources within the OU using a Group Policy Object (GPO).
Warning: Teams shouldn't apply smart card authentication to domain controllers until passwordless authentication has been thoroughly tested. Doing so may cause teams to become locked out of the domain.
Before you begin
Start the task
- Distribute the certificate using a GPO.
- Right-click the Domain Controllers object and select Create a GPO in this domain, and Link it here....
- From the New GPO window, name the GPO Advanced Server Access - Certificate.
- Click OK.
- In the console tree, go to Computer Configuration\Policies\Windows Settings\Security Settings\Public Key Policies.
- Right-click Trusted Root Certification Authorities and click Import.
- In the Welcome to the Certificate Import Wizard, click Next.
- Specify the path to the certificate file that you created earlier and click Next.
- Click Place all certificates in the following store and click Next.
- Verify the information and click Finish.
- Disable Network Level Authentication.
- From the Group Policy Management screen, identify Advanced Server Access - Certificate GPO.
- Right-click the GPO and click Edit.
- In the console tree, go to Computer Configuration\Policies\Administrative Templates\Windows Components\Remote Desktop Services\Remote Desktop Session Host\Security.
- Double-click Require user authentication for remove connections by using Network Level Authentication.
- In the properties window, select Disabled.
- Click Apply and then click OK.
- Assign the GPO to the Advanced Server Access OU.
- From the Group Policy Management snap-in, identify the Advanced Server Access OU.
- Right-click the domain controller and click Link an Existing GPO.
- In the Select GPO window, select the Advanced Server Access - Certificate GPO.
- Click OK.
- Require smart card authentication for accounts.
- Don't apply this policy to domain controllers until passwordless authentication has been thoroughly tested. Doing so may cause you to become locked out of the domain.
- If your Okta org uses Active Directory delegated authentication, applying this policy to user accounts will make them unable to access the Okta dashboard.
- Right-click the Advanced Server Access OU and select Create a GPO in this domain, and Link it here....
- From the New GPO window, name the GPO Advanced Server Access - Authentication.
- Click OK.
- In the console tree, go to Computer Configuration\Policies\Windows Settings\Security Settings\Local Policies\Security Options.
- Double-click Interactive logon: Require Windows Hello for Business or smart card.
Note: Some Windows versions use the Interactive logon: Require smart card instead. - In the properties window, select Define this policy setting.
- Select Enabled.
Warning: Teams shouldn't apply smart card authentication to domain controllers until passwordless authentication has been thoroughly tested. Doing so may cause teams to become locked out of the domain. - Click Apply and then click OK.