Integrate IDaaS Desktop

IDaaS Desktop provides strong second-factor authentication to Windows Desktop Login (online or offline). Local users of the computer on which the IDaaS Desktop for Microsoft Windows is installed are not required to use second-factor authentication to log in.

Note: This integration provides the instructions to add IDaaS Desktop for Microsoft Windows to Identity as a Service. For legacy versions of Entrust IdentityGuard Desktop for Windows, see Integrate Entrust IdentityGuard Desktop for Microsoft Windows.

Entrust Desktop for Microsoft Windows contains a credential provider. The credential provider responds to these use cases:

       workstation login

       workstation unlock

       password change

       credential prompt (run elevated)

When you install the Entrust Desktop for Microsoft Windows package, the installation installs a Credential Provider Filter. You can opt to have this filter replace default Windows behavior, or you can have more that one credential provider coexist with this filter to handle different use cases.

Supported authentication methods

Support for offline token

Integrate Desktop for Windows

1.      To complete this procedure, you need to reference the Entrust Desktop for Microsoft Windows Administration Guide.

Note: To ensure that you are using the latest version of the document, it is best to download the document from Entrust TrustedCare.

a.      Log in to Entrust TrustedCare.

b.      Click Products.

c.      Scroll to Identity Enterprise > Server (Consumer and Enterprise).

d.      Under related software, click Desktop for Microsoft Windows.

e.      Click Documents and download the Entrust Desktop for Windows Administration Guide.

2.      Add IDaaS Desktop for Microsoft Windows to Identity as a Service.

3.      Be sure to copy the Application ID. You need this ID to complete the installation of the Entrust Desktop for Microsoft Windows for Identity as a Service.

4.      Protect IDaaS Desktop for Windows with a resource rule. When setting the authentication methods for the resource rule, select Password for first-factor and deselect all second-factor authentication methods.

Note: Before you begin, note the following information for the step that requires you to set the Authentication Decision risk settings if you want to support offline KBA authentication.

To support offline KBA authentication, you must

a.      Select Knowledge-based Authenticator and at least one other type of supported authenticator as the Second Factors authenticators for Low Risk users.

b.      Click and drag the Knowledge-based Authenticator so that it is not at the top of Second Factors list for Low Risk users.

5.      Using the Entrust Desktop for Microsoft Windows Administration Guide documentation, complete the following:

a.      Install Entrust Desktop for Windows for Identity as a Service.

b.      Configure Entrust Desktop for Windows for Identity as a Service.