<?xml version="1.0" encoding="utf-8"?>
<?xml-stylesheet type="text/xsl" href="http://azure.authlite.com/rss/xslt"?>
<rss xmlns:a10="http://www.w3.org/2005/Atom" version="2.0">
  <channel>
    <title>Knowledge Base</title>
    <link>http://azure.authlite.com/kb</link>
    <description />
    <generator>AuthLite</generator>
    <item>
      <guid isPermaLink="false">1734</guid>
      <link>http://azure.authlite.com/kb/getting-an-evaluation</link>
      <title>Getting an Evaluation</title>
      <description>&lt;p&gt;You can evaluate the AuthLite software at no cost.  Downloads of the documentation and installers can be found on the &lt;a href="/downloads" title="Downloads"&gt;downloads page&lt;/a&gt;.&lt;br /&gt; &lt;br /&gt; To get an evaluation license, see the PDF documentation section "Licensing AuthLite".  You will need to install AuthLite on your domain first.  After restarting the first DC and logging on, the AuthLite Configuration application will appear, with the required License ID. &lt;/p&gt;
&lt;p&gt;&lt;br /&gt;If you need to buy YubiKey tokens for testing, please &lt;a data-id="1302" href="/contact" title="Contact"&gt;contact us&lt;/a&gt;. You can return them in good condition for a refund (less shipping) if you decide not to keep AuthLite. &lt;/p&gt;
&lt;p&gt;You can also get YubiKeys from many other vendors including &lt;a href="http://Yubico.com"&gt;Yubico&lt;/a&gt;, the manufacturer.  Make sure not to get the blue "security key" model, since that is not actually a Yubikey and doesn't support the OTP and C/R modes needed by AuthLite.&lt;br /&gt; &lt;br /&gt; You may also find the "version 2" videos to be of interest, on the &lt;a href="/videos" title="Videos"&gt;videos page&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;AuthLite can be very lightweight when configured properly for your environment, but it has many complex possibilities that can be confusing when you are getting started.  Please do not hesitate to open a support request from our &lt;a href="/support" title="Support"&gt;support page&lt;/a&gt; if you get stuck or have questions about how best to configure AuthLite!&lt;/p&gt;</description>
      <a10:updated>2016-09-12T21:25:15Z</a10:updated>
    </item>
    <item>
      <guid isPermaLink="false">1426</guid>
      <link>http://azure.authlite.com/kb/free-upgrade-upgrade-prices</link>
      <title>Free upgrade / upgrade prices</title>
      <description>&lt;p&gt;You are always welcome to install the latest version number of any product you have licensed. See the &lt;a href="/downloads" title="Downloads"&gt;Downloads page&lt;/a&gt; for the available versions.&lt;/p&gt;
&lt;p&gt;For &lt;em&gt;minor&lt;/em&gt; version updates, usually "just install over and click through" is fine.  The installer or Configuration tool will alert you if any changes require your attention.&lt;/p&gt;
&lt;p&gt;We cannot guarantee upgrades between &lt;em&gt;major&lt;/em&gt; version changes will be easy or "just click through".  For example, v1.2 -&amp;gt; v2.0 was a &lt;em&gt;very&lt;/em&gt; different product, and it's best to ask for our help to plan the migration of your servers, workstations, and configuration. &lt;/p&gt;
&lt;p&gt;If you have any questions about upgrading or changing your license, please &lt;a href="/support" title="Support"&gt;open a support request&lt;/a&gt; for assistance.&lt;/p&gt;</description>
      <a10:updated>2015-02-08T05:07:38Z</a10:updated>
    </item>
    <item>
      <guid isPermaLink="false">1425</guid>
      <link>http://azure.authlite.com/kb/how-do-i-talk-to-a-real-person</link>
      <title>How do I talk to a real person?</title>
      <description>&lt;p&gt;If you have a technical question and can't find the answer here, please open a support request from our &lt;a href="/support" title="Support"&gt;support page&lt;/a&gt;.&lt;br /&gt;&lt;br /&gt;If you have a sales question or other non-technical inquiry, please see our &lt;a href="/contact" title="Contact"&gt;contact page&lt;/a&gt;&lt;/p&gt;</description>
      <a10:updated>2015-02-08T04:53:32Z</a10:updated>
    </item>
    <item>
      <guid isPermaLink="false">1428</guid>
      <link>http://azure.authlite.com/kb/how-to-update</link>
      <title>How to update</title>
      <description>&lt;p&gt;You can always download the newest version number of each product from this web site. In general, you can simply run the new installer to upgrade over the old copy, automatically preserving your settings.&lt;/p&gt;
&lt;p&gt;In some cases it may be necessary to uninstall the old version first, or to reboot services or the machine afterward. The installer will tell you if any of these things are required.&lt;/p&gt;
&lt;p&gt;If you have any questions about updating, please don't hesitate to &lt;a href="/support" title="Support"&gt;open a support request&lt;/a&gt; for assistance.&lt;/p&gt;</description>
      <a10:updated>2015-02-08T05:15:29Z</a10:updated>
    </item>
    <item>
      <guid isPermaLink="false">1429</guid>
      <link>http://azure.authlite.com/kb/installation-prerequisites</link>
      <title>Installation Prerequisites</title>
      <description>&lt;p&gt;Some of our products require certain Microsoft software to be installed first.&lt;br /&gt;&lt;br /&gt;In order to install some products, you may need to first download and install certain Microsoft updates. The installer will tell you if you lack a necessary feature, and direct you to this page for download instructions.&lt;/p&gt;
&lt;h2&gt;Microsoft .NET Framework&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;AuthLite version 2.0 and earlier, and our ISA/TMG plugins require .NET version 2 or later.&lt;/li&gt;
&lt;li&gt;AuthLite version 2.1 and later require .NET version 4 or later.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Windows Server 2003-2008, Windows XP and 7&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;You can install the .NET framework by downloading the installers from Microsoft. &lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Windows Server 2012 and later, Windows 8 and later&lt;/h3&gt;
&lt;p&gt;These Windows versions come with v4 or later of the .NET framework.  &lt;/p&gt;</description>
      <a10:updated>2015-02-08T05:33:52Z</a10:updated>
    </item>
    <item>
      <guid isPermaLink="false">1237</guid>
      <link>http://azure.authlite.com/kb/authlite-and-citrix</link>
      <title>AuthLite and Citrix</title>
      <description>&lt;p&gt;You can use the Citrix W.I.'s built-in ability to use 2 factor authentication, with AuthLite Split-mode users.Citrix will authenticate the username/password combo the same way you have it set currently, and then it will send the username and OTP over RADIUS to AuthLite for the second factor authentication.&lt;/p&gt;
&lt;p&gt;You may either use the AuthLite RADIUS service, or the IAS/NPS plugin if you require the flexibility of using IAS/NPS for your RADIUS server.&lt;/p&gt;
&lt;h2 class="ArticleBody"&gt;Configuring to use IAS/NPS for RADIUS&lt;/h2&gt;
&lt;p&gt;On each DC you want to use for authenticating Citrix users:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Install the Internet Authentication Service (called Network Policy Server on 2008 and higher)&lt;/li&gt;
&lt;li&gt;In AuthLite config, go to Service Configuration -&amp;gt; IAS/NPS plugin&lt;/li&gt;
&lt;li&gt;Enable IAS/NPS support on this server&lt;/li&gt;
&lt;li&gt;Apply changes&lt;/li&gt;
&lt;li&gt;Restart the AuthLite and IAS/NPS services to pick up those changes&lt;/li&gt;
&lt;li&gt;In the IAS or NPS configuration panel on this server, set up the Citrix WI as a RADIUS client&lt;/li&gt;
&lt;li&gt;Set the shared secret&lt;/li&gt;
&lt;li&gt;Set up a connection policy that will use PAP authentication&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;Citrix WI configuration&lt;/h2&gt;
&lt;p&gt;An overview of settings you need in the Citrix Web Interface site:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Authentication method: explicit&lt;/li&gt;
&lt;li&gt;Authentication type: windows&lt;/li&gt;
&lt;li&gt;Credential format: Domain user name only&lt;/li&gt;
&lt;li&gt;Display your domain name pre-populated, for convenience of users&lt;/li&gt;
&lt;li&gt;Two-factor authentication
&lt;ul&gt;
&lt;li&gt;Two-factor setting: RADIUS&lt;/li&gt;
&lt;li&gt;Define radius servers and ports to AuthLite DC's with their RADIUS service configured (see above)&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Make a text file (seriously) called "radius_secret.txt" containing only the shared secret text string you want to use for RADIUS.&lt;/li&gt;
&lt;li&gt;Put that text file in the Inetpub\Citrix\XenApp (or path to your W.I. site) \ conf folder.&lt;/li&gt;
&lt;li&gt;On the firewall between W.I. server and the DC's, you'll need to allow UDP 1812 so the RADIUS traffic can pass.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;When you have all this done, loading the W.I. logon screen should display an additional field "passcode", into which the AuthLite OTP key can be tapped.&lt;/p&gt;</description>
      <a10:updated>2014-10-23T21:48:49Z</a10:updated>
    </item>
    <item>
      <guid isPermaLink="false">1433</guid>
      <link>http://azure.authlite.com/kb/unattendedcommand-line-deployment-of-authlite</link>
      <title>Unattended/command line deployment of AuthLite</title>
      <description>&lt;p&gt;In medium/large organizations, visiting each workstation to install the AuthLite software is not practical. This article contains pointers on deploying with Group Policy Objects (GPO)&lt;/p&gt;
&lt;p&gt;This article contains notes on deploying the AuthLite_installer_Win32.msi and AuthLite_installer_x64.msi with Group Policy Objects (GPO) If you are already familiar with using GPO to deploy software, many of these points may be redundant to you. These notes highlight issues and decision points you may encounter, but should not be considered a replacement for a good grounding in GPO deployment concepts.&lt;/p&gt;
&lt;h2&gt;Prerequisites&lt;/h2&gt;
&lt;p&gt;The AuthLite installer will fail unless the Microsoft .NET framework is installed on the system (version requirements vary by AuthLite version). If your workstations don't already have this installed, then you will need to push the appropriate version.  If you do this with a GPO, make sure the framework install runs before the AuthLite .msi, otherwise the latter will fail. You can do this by setting the framework GPO's link number higher than the AuthLite GPO.&lt;/p&gt;
&lt;h2&gt;GPO deployment tips&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;Your GPO's should assign the package to computers, not to the users.&lt;/li&gt;
&lt;li&gt;To apply a policy to your workstations, the computer accounts need to be placed in an OU instead of the default "Computers" container in AD&lt;/li&gt;
&lt;li&gt;The computer accounts of the workstations must be able to access the .msi files over the network. If your workstations' App or System event logs show error 1612, that means the installer could not be accessed! The recommended way to set this up is to create your own DFS share. For&lt;strong&gt; testing purposes&lt;/strong&gt; you can put the .msi files in the SYSVOL area of the domain controller, which can then be assigned and accessed as \\YourDomainName\SYSVOL\your.domain.fqdn\AuthLite_installer_x64.msi. Microsoft highly recommends not doing this in production, due to issues as noted in &lt;a href="http://support.microsoft.com/kb/889710"&gt;this kb&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;AuthLite uses a separate installer file for 32 and 64 bit machines. If you have 32 and 64 bit machines in your environment, you should create a separate GPO for each case, so you can use use a WMI filter to make sure the right installer is applied to the right machines. The correct WMI filter settings are, in the root\CIMv2 namespace:&lt;br&gt;&lt;br&gt;(32 bit):
&lt;pre&gt;SELECT AddressWidth FROM Win32_Processor WHERE AddressWidth ='32'&lt;/pre&gt;
&lt;br&gt;(64 bit):
&lt;pre&gt;SELECT AddressWidth FROM Win32_Processor WHERE AddressWidth ='64'&lt;/pre&gt;
&lt;/li&gt;
&lt;li&gt;Once you apply your GPO's to an OU containing workstations, those machines will try to install the software when they are next rebooted. Check the workstation event log for troubleshooting.&lt;/li&gt;
&lt;li&gt;To make logons faster, workstations apply GPOs asynchronously by default, as &lt;a href="http://technet.microsoft.com/en-us/library/cc787386.aspx"&gt;noted here&lt;/a&gt;. This means if a user logs on right away, it may take an additional reboot before the install is attempted. To mitigate this, you can set the GPO item Computer\Policies\Administrative Templates\System\Logon "Always wait for the network at computer startup and logon". However if you are assigning that policy at the same time as the software install, then the "wait" policy itself will be applied asynchronously the first time, resulting in the same issue (another reboot needed).&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;MST Transforms&lt;/h2&gt;
&lt;p&gt;With some deployment systems (such as Group Policy) you can apply a transform (.mst file) to affect the set of features and properties selected.  We have published a few common requests here:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Turn on the NFC feature: &lt;a href="https://s3.authlite.com/downloads/NfcOn.mst"&gt;NfcOn.mst&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Don't install any Shortcuts to the Start Menu: &lt;a href="https://s3.authlite.com/downloads/NoShortcuts.mst"&gt;NoShortcuts.mst&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Force a DC install to AVOID all partition operations. This is useful as one component of a DC automated deployment, but you must manually ensure all partition operations still get completed (i.e. using ntdsutil and ldifde).  &lt;a href="https://s3.authlite.com/downloads/NoPartitionOperations.mst"&gt;NoPartitionOperations.mst&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;msiexec Switches&lt;/h2&gt;
&lt;p&gt;The AuthLite MSI installer is run by msiexec.exe, so you can use all flags supported by that tool.  See &lt;a href="https://docs.microsoft.com/en-us/windows/win32/msi/command-line-options"&gt;Microsoft's msiexec documentation&lt;/a&gt;.&lt;/p&gt;
&lt;h2&gt;Property Automation&lt;/h2&gt;
&lt;p&gt;You can set certain properties from the command line to control installer behavior.  Call like:&lt;/p&gt;
&lt;pre&gt;AuthLite_installer_x64.msi PROPERTY=VALUE&lt;/pre&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;NOSHORTCUTS=1&lt;/strong&gt; : Prevent all Start Menu shortcuts from being installed. Overrides feature selection.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;CREATESCHEMA=0&lt;/strong&gt; : Prevent installer from trying to check and update the forest schema to support the current installer.  If you use this option you &lt;strong&gt;must&lt;/strong&gt; &lt;a href="/kb/manual-schema-additions" title="Manual Schema Additions"&gt;manage the schema manually&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;CREATEPARTITION=0&lt;/strong&gt; : Prevent installer from trying to create the AuthLite application partition.  You can use this if you are sure the partition is already set up and working, but the installer is having problems passing that step.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;MACHINETYPE=MemberWorkstation&lt;/strong&gt; : If you are trying to pre-install on a workstation image which isn't joined to the domain yet, or trying to remove from a machine that was parted from the domain, you can use this property to trick the installer into running as though the machine was on the domain.  Note this will &lt;strong&gt;not&lt;/strong&gt; allow you to actually &lt;strong&gt;use&lt;/strong&gt; AuthLite on a workgroup machine. It will still only work on domain-joined machines.&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;Feature Selection&lt;/h2&gt;
&lt;p&gt;To control which features are selected from the command line, you can invoke the installer like:&lt;/p&gt;
&lt;pre&gt;AuthLite_installer_x64.msi ADDLOCAL=&lt;strong&gt;DataManager,Nfc&lt;/strong&gt;&lt;/pre&gt;
&lt;p&gt;Where the comma separated list of features after ADDLOCAL will be installed.  At the time of writing, AuthLite v2.4.10 has the following feature options:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Replica&lt;/strong&gt;: On a DC, attempts to set the DC to have a replica of the AuthLite application partition. If you do not specify this feature, you &lt;strong&gt;must&lt;/strong&gt; manually manage your replicas with ntdsutil, to avoid data loss!&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;DataManager&lt;/strong&gt;: Installs the AuthLite Token Manager application and associated start menu shortcut. &lt;/li&gt;
&lt;li&gt;&lt;strong&gt;AdminAPI&lt;/strong&gt;: Installs a shortcut to launch AuthLite Admin Powershell prompt.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;AdminShortcut&lt;/strong&gt;: Installs a shortcut to launch the AuthLite Configuration application.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;YubiKeyProgrammerShortcut&lt;/strong&gt;: Installs a shortcut to launch the AuthLite YubiKey Programmer application.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;SelfProvisionShortcut&lt;/strong&gt;: Installs a shortcut to launch the Enroll with AuthLite self-service application.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Nfc&lt;/strong&gt;: Installs NFC reader support.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;AuthLiteDriver&lt;/strong&gt;: Installs the AuthLite Kernel Driver&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Note that presence/absence of executables or shortcuts does not actually grant or restrict the access for accounts to read/write settings or token records. Control who has token access from the Administrative Groups setting in AuthLite Configuration.&lt;/p&gt;</description>
      <a10:updated>2015-02-08T05:53:08Z</a10:updated>
    </item>
    <item>
      <guid isPermaLink="false">1502</guid>
      <link>http://azure.authlite.com/kb/authlite-v2-and-citrix</link>
      <title>AuthLite v2 and Citrix</title>
      <description>&lt;p&gt;You can use the Citrix W.I.'s built-in ability to use 2 factor authentication, with AuthLite users. Citrix will authenticate the username/password combo the same way you have it set currently, and then it will send the username and OTP over RADIUS to AuthLite for the second factor authentication.&lt;/p&gt;
&lt;h2&gt;Configuring to use IAS/NPS for RADIUS&lt;/h2&gt;
&lt;p&gt;On each domain member server that you want to use for authenticating Citrix users:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Install the IAS (Internet Authentication Service) or NPS (Network Policy Server on 2008 and higher)&lt;/li&gt;
&lt;li&gt;In AuthLite config, go to Service Configuration -&amp;gt; IAS/NPS plugin&lt;/li&gt;
&lt;li&gt;Enable IAS/NPS support on this server&lt;/li&gt;
&lt;li&gt;Select "One factor PAP" and the checkbox to not require domain name.&lt;/li&gt;
&lt;li&gt;Apply changes&lt;/li&gt;
&lt;li&gt;Restart the AuthLite service and the IAS/NPS services to pick up those changes.  Or, restart the server.&lt;/li&gt;
&lt;li&gt;In the IAS or NPS configuration panel on this server, set up the Citrix WI as a RADIUS client&lt;/li&gt;
&lt;li&gt;Set the shared secret&lt;/li&gt;
&lt;li&gt;Set up a connection policy that will use PAP authentication&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;Citrix WI configuration&lt;/h2&gt;
&lt;p&gt;An overview of settings you need in the Citrix Web Interface site:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Authentication method: explicit&lt;/li&gt;
&lt;li&gt;Authentication type: windows&lt;/li&gt;
&lt;li&gt;Credential format: Domain user name only&lt;/li&gt;
&lt;li&gt;Display your domain name pre-populated, for convenience of users&lt;/li&gt;
&lt;li&gt;Two-factor authentication
&lt;ul&gt;
&lt;li&gt;Two-factor setting: RADIUS&lt;/li&gt;
&lt;li&gt;Define radius servers and ports to AuthLite DC's with their RADIUS service configured (see above)&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Make a text file (seriously) called "radius_secret.txt" containing only the shared secret text string you want to use for RADIUS.&lt;/li&gt;
&lt;li&gt;Put that text file in the Inetpub\Citrix\XenApp (or path to your W.I. site) \ conf folder.&lt;/li&gt;
&lt;li&gt;On the firewall between W.I. server and the DC's, you'll need to allow UDP 1812 so the RADIUS traffic can pass.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;When you have all this done, loading the W.I. logon screen should display an additional field "passcode", into which the AuthLite OTP key can be entered.&lt;/p&gt;</description>
      <a10:updated>2015-02-23T00:20:43Z</a10:updated>
    </item>
    <item>
      <guid isPermaLink="false">1503</guid>
      <link>http://azure.authlite.com/kb/authlite-on-uag</link>
      <title>AuthLite on UAG</title>
      <description>&lt;p&gt;Microsoft UAG easily supports setting up two separate authentication factors, so it is most natural to use AuthLite Split mode users, and the AuthLite RADIUS service to authenticate OTPs.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;You probably already have Active Directory set up as an authentication service; this does not need to be changed.&lt;/li&gt;
&lt;li&gt;In Admin-&amp;gt;Authentication and Authorization Servers, add a RADIUS authentication server type&lt;/li&gt;
&lt;li&gt;Configure this to point at the AuthLite RADIUS server and port, and set the shared secret.&lt;/li&gt;
&lt;li&gt;Follow the AuthLite pdf manual to set up the RADIUS service. You should select "Permit requests that don't send the domain name"&lt;/li&gt;
&lt;li&gt;In your trunk configuration's Authentication section, select "Require users to authenticate to each server", and "Authenticate to each server with the same user name"&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;There is one more important change you need to make. By default, password input fields in UAG are limited to 20 characters! AuthLite OTPs require 64 characters. Fortunately you can customize this value in UAG as shown in this &lt;a href="http://technet.microsoft.com/en-us/library/ff607319.aspx"&gt;technet article&lt;/a&gt;.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Begin with the file: InternalSite\inc\customDefault.inc&lt;/li&gt;
&lt;li&gt;Copy it into the subfolder InternalSite\inc\CustomUpdate&lt;/li&gt;
&lt;li&gt;In a text editor, open the new copy of the file.&lt;/li&gt;
&lt;li&gt;Remove the comment block at the top, and the code block at the bottom that indicates it should be removed when used with CustomUpdate&lt;/li&gt;
&lt;li&gt;The value PasswordLimit = 20 should be changed to at least 64&lt;/li&gt;
&lt;li&gt;Save and close the changed file&lt;/li&gt;
&lt;li&gt;Save and apply your UAG configuration&lt;/li&gt;
&lt;/ul&gt;</description>
      <a10:updated>2015-02-23T00:33:27Z</a10:updated>
    </item>
    <item>
      <guid isPermaLink="false">1504</guid>
      <link>http://azure.authlite.com/kb/authlite-v2-on-uag</link>
      <title>AuthLite v2 on UAG</title>
      <description>&lt;p&gt;Microsoft UAG easily supports setting up two separate authentication factors.&lt;/p&gt;
&lt;p&gt;Configuring the RADIUS server:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Install the IAS (Internet Authentication Service) or NPS (Network Policy Server on 2008 and higher)&lt;/li&gt;
&lt;li&gt;In AuthLite config, go to Service Configuration -&amp;gt; IAS/NPS plugin&lt;/li&gt;
&lt;li&gt;Enable IAS/NPS support on this server&lt;/li&gt;
&lt;li&gt;Select "One factor PAP" and the checkbox to not require domain name.&lt;/li&gt;
&lt;li&gt;Apply changes&lt;/li&gt;
&lt;li&gt;Restart the AuthLite service and the IAS/NPS services to pick up those changes.  Or, restart the server.&lt;/li&gt;
&lt;li&gt;In the IAS or NPS configuration panel on this server, set up the Citrix WI as a RADIUS client&lt;/li&gt;
&lt;li&gt;Set the shared secret&lt;/li&gt;
&lt;li&gt;Set up a connection policy that will use PAP authentication&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Configuring UAG:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;You probably already have Active Directory set up as an authentication service; this does not need to be changed.&lt;/li&gt;
&lt;li&gt;In Admin-&amp;gt;Authentication and Authorization Servers, add a RADIUS authentication server type&lt;/li&gt;
&lt;li&gt;Configure this to point at the IAS/NPS RADIUS server and port, and set the shared secret.&lt;/li&gt;
&lt;li&gt;In your trunk configuration's Authentication section, select "Require users to authenticate to each server", and "Authenticate to each server with the same user name"&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;There is one more important change you need to make. By default, password input fields in UAG are limited to 20 characters! AuthLite OTPs require 64 characters. Fortunately you can customize this value in UAG as shown in this &lt;a href="http://technet.microsoft.com/en-us/library/ff607319.aspx"&gt;technet article&lt;/a&gt;.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Begin with the file: InternalSite\inc\customDefault.inc&lt;/li&gt;
&lt;li&gt;Copy it into the subfolder InternalSite\inc\CustomUpdate&lt;/li&gt;
&lt;li&gt;In a text editor, open the new copy of the file.&lt;/li&gt;
&lt;li&gt;Remove the comment block at the top, and the code block at the bottom that indicates it should be removed when used with CustomUpdate&lt;/li&gt;
&lt;li&gt;The value PasswordLimit = 20 should be changed to at least 64&lt;/li&gt;
&lt;li&gt;Save and close the changed file&lt;/li&gt;
&lt;li&gt;Save and apply your UAG configuration&lt;/li&gt;
&lt;/ul&gt;</description>
      <a10:updated>2015-02-23T00:35:33Z</a10:updated>
    </item>
    <item>
      <guid isPermaLink="false">1505</guid>
      <link>http://azure.authlite.com/kb/authlite-permission-to-program-split-keys</link>
      <title>AuthLite Permission to program Split Keys</title>
      <description>&lt;p&gt;By default only Domain Admins are allowed to program split-mode AuthLite keys for other users. You can change a setting to allow other groups this access.&lt;/p&gt;
&lt;p&gt;In AuthLite version 1.2 there is no user interface to set this permission, so it needs to be set manually via ADSI Edit.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Create or select a group you wish to use for key provisioning&lt;/li&gt;
&lt;li&gt;Add a user account to that group&lt;/li&gt;
&lt;li&gt;Log in with that user. If you are already logged in with the user, then LOG OUT and log in again to update your token.&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Use the command "whoami /groups" to discover the SID of the group. You need this to construct the permission setting. To find the SID, locate the name of the group in the left hand column of the "whoami" print out, then scan to the right until you find the long string that has the form:&lt;/p&gt;
&lt;pre&gt;S-1-n-nn-nnnnnnnnn-nnnnnnnnnn-nnnnnnnnnn-nnn &lt;/pre&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;On a DC, open ADSI Edit and connect to the distinguished name of the AuthLite partition on your domain. This will be similar to:&lt;/p&gt;
&lt;pre&gt;DC=AuthLite,DC=sandbox,DC=collectivesoftware,DC=com &lt;/pre&gt;
&lt;p&gt;but everything after "DC=AuthLite," will be based on the FQDN of your domain instead:&lt;/p&gt;
&lt;pre&gt;DC=AuthLite,DC=your,DC=actual,DC=domain,DC=com &lt;/pre&gt;
&lt;/li&gt;
&lt;li&gt;Expand the main DC=AuthLite item and select the sub-item "CN=AuthLiteSettings"&lt;/li&gt;
&lt;li&gt;Right-click in the right pane, and select New-&amp;gt;Object&lt;/li&gt;
&lt;li&gt;Select the item "collectiveAuthLiteSetting"&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;The value should be set to exactly:&lt;/p&gt;
&lt;pre&gt;ProvisionSplitKeys &lt;/pre&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Click "More attributes"&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;Select the property "collectiveAuthLiteSettingValue&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;In the Edit attribute box, enter a value similar to:&lt;/p&gt;
&lt;pre&gt;D:AI(A;;FR;;;DA)(A;;FR;;;S-1-n-nn-nnnnnnnnn-nnnnnnnnnn-nnnnnnnnnn-nnn) &lt;/pre&gt;
&lt;p&gt;but replace the SID placeholder with the SID you found for your key provisioning group. If you want to add other groups you can append more (A;;FR;;;S-1-...) portions to the end.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;Click Set, OK, and Finish&lt;/li&gt;
&lt;li&gt;This setting will not be refreshed on client for up to 20 minutes.&lt;/li&gt;
&lt;/ul&gt;</description>
      <a10:updated>2015-02-23T00:39:25Z</a10:updated>
    </item>
    <item>
      <guid isPermaLink="false">1507</guid>
      <link>http://azure.authlite.com/kb/authlite-powershell-provider</link>
      <title>AuthLite PowerShell provider</title>
      <description>&lt;p&gt;AuthLite version 1.0.6 and later registers a PowerShell provider interface (snap-in) for accessing the AuthLite data store of the local machine.&lt;/p&gt;
&lt;h4&gt;Setup&lt;/h4&gt;
&lt;p&gt;By default, this snap-in will not be loaded into your shell. To enable AuthLite PowerShell integration, you should run the following commands from inside PS:&lt;/p&gt;
&lt;pre&gt;Add-PSSnapin AuthLiteProvider  # Note this requirement will be changed in the future # once Collective begins signing our ps1 scripts Set-ExecutionPolicy Unrestricted  if("$Env:ProgramW6432" -ne "") {    Update-FormatData -PrependPath "$Env:ProgramW6432\Collective Software\AuthLite\AuthLiteProvider.format.ps1xml" } else {    Update-FormatData -PrependPath "$Env:ProgramFiles\Collective Software\AuthLite\AuthLiteProvider.format.ps1xml" } &lt;/pre&gt;
&lt;p&gt;These commands load the snap-in and default data formatting cues for AuthLite data access. You would normally place these commands into a PS profile.&lt;/p&gt;
&lt;h4&gt;Sample commands&lt;/h4&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;Obtain a recursive list of information in the data store:&lt;/p&gt;
&lt;pre&gt;ls -r AUTHLITE:\ &lt;/pre&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Go to the Keys directory (assuming your domain name is 'Sandbox'), and then obtain a list of every username that is set up with an AuthLite key. The use of ToLower, Sort-Object, and Get-Unique here ensures that you see each username only once, even if there is more than one key associated to that user.&lt;/p&gt;
&lt;pre&gt;cd AUTHLITE:\Sandbox\Keys ls | ForEach-Object{$_.Username.tolower()}|Sort-object|get-unique &lt;/pre&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Print out the license key to the console, using variable interpolation. Again, assuming the domain name is Sandbox:&lt;/p&gt;
&lt;pre&gt;Write-Host "The value of the license key is: ${AUTHLITE:\Sandbox\Settings\License\Value}." &lt;/pre&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;h4&gt;Limitations&lt;/h4&gt;
&lt;p&gt;At the time of this article's writing, the provider is read-only, i.e. there is no way to add, change, or remove data from the store via this provider. This functionality is planned for a future release!&lt;/p&gt;</description>
      <a10:updated>2015-02-23T00:53:43Z</a10:updated>
    </item>
    <item>
      <guid isPermaLink="false">1508</guid>
      <link>http://azure.authlite.com/kb/authlite-upgrade-advisory-1</link>
      <title>AuthLite Upgrade Advisory #1</title>
      <description>&lt;h2&gt;Overview&lt;/h2&gt;
&lt;p&gt;On November 11, 2013, Collective Software discovered and fixed a potential information disclosure bug of moderate impact, that could ultimately be used to launch privilege escalation attacks against an affected AuthLite installation and its domain users.  This issue can only impact customers who have AuthLite deployed in their Active Directory.  &lt;br /&gt; &lt;br /&gt; To eliminate the potential for information disclosure in your AuthLite deployment, every customer using AuthLite in their domain should take one of the following steps as soon as possible:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;For AuthLite 2.0 users: Install version 2.0.33 or later from &lt;a href="http://www.authlite.com/"&gt;AuthLite.com&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;For AuthLite 1.x users: Install version 1.2.28 or later from &lt;a href="http://www.authlite.com/"&gt;AuthLite.com&lt;/a&gt;.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;If you require further details, or assistance with installing the upgrade, please open a Support Request from our &lt;a href="/support" title="Support"&gt;Support&lt;/a&gt; page.&lt;/p&gt;
&lt;h2&gt;Common Questions and Answers&lt;/h2&gt;
&lt;h4&gt;Should I upgrade from v1.x to version 2?&lt;/h4&gt;
&lt;p&gt;No, you should probably just update to the latest 1.2 build.  Version 2 is a much more complex product and a proper upgrade requires a substantial amount of planning, configuration, and testing.  We even &lt;a href="#" title="AuthLite Store"&gt;offer professional services&lt;/a&gt; just to help with this.  In short, it's not something to be undertaken lightly.&lt;/p&gt;
&lt;h4&gt;My Replay Windows stopped working after the update, what happened?&lt;/h4&gt;
&lt;p&gt;Thanks to a customer report we discovered a  bug introduced in 2.0.30 that made previous replay window settings fail until they were re-saved in the configuration.  We fixed this issue in 2.0.33.  You could work around the issue by going into each replay window setting and re-applying the settings.  Contact &lt;a href="/support" title="Support"&gt;Support&lt;/a&gt; if you need assistance.&lt;/p&gt;
&lt;h4&gt;Where do I have to install the update?&lt;/h4&gt;
&lt;p&gt;Install the updated software on all Domain Controllers that currently have AuthLite installed.&lt;/p&gt;
&lt;h4&gt;Was this issue remotely exploitable?&lt;/h4&gt;
&lt;p&gt;No, this issue required an attacker to be inside your organization's network.&lt;/p&gt;
&lt;h4&gt;Where was information potentially disclosed?&lt;/h4&gt;
&lt;p&gt;Information could only potentially be disclosed within your organization's network.  There was no exposure outside the network.&lt;/p&gt;
&lt;h4&gt;Could any information be exposed anonymously?&lt;/h4&gt;
&lt;p&gt;No, only authenticated domain users could have access to this data.&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;</description>
      <a10:updated>2015-02-23T01:00:26Z</a10:updated>
    </item>
    <item>
      <guid isPermaLink="false">1509</guid>
      <link>http://azure.authlite.com/kb/authlite-upgrade-advisory-2</link>
      <title>AuthLite Upgrade Advisory #2</title>
      <description>&lt;h2&gt;Overview&lt;/h2&gt;
&lt;p&gt;On January 2. 2014, Collective Software identified a VPN configuration that could lead to 2-factor logons not being properly enforced.  VPNs with a vulnerable configuration could allow users to log in even when the one-time passcode (OTP) supplied is incorrect.&lt;/p&gt;
&lt;p&gt;To eliminate any potential for users authenticating without proper credentials, please check whether your configuration is affected, and deploy the new build or a configuration workaround (details below).&lt;/p&gt;
&lt;h2&gt;Affected AuthLite Versions&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;AuthLite version 1.x: &lt;strong&gt;not affected&lt;/strong&gt;. You don't need to do anything, apart from make sure you have already updated for the older &lt;a href="/kb/authlite-upgrade-advisory-1" title="AuthLite Upgrade Advisory #1"&gt; Advisory #1&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;AuthLite version 2.0.18-2.0.38: &lt;strong&gt;potentially affected&lt;/strong&gt;, see below for configuration details. &lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;Affected Configurations&lt;/h2&gt;
&lt;p&gt;If your configuration matches &lt;strong&gt;all of the following points&lt;/strong&gt;, then your VPN is potentially vulnerable, and AuthLite should be updated or its configuration changed.&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;IAS/NPS plug-in is active&lt;/li&gt;
&lt;li&gt;IAS/NPS plug-in is set for 2-factor authentication&lt;/li&gt;
&lt;li&gt;"Replay Behavior" configuration is set to "Retry as 1-factor"&lt;/li&gt;
&lt;li&gt;Your IAS/NPS servers are not listed in the Forced 2-factor Computers list&lt;/li&gt;
&lt;/ol&gt;
&lt;h2&gt;What Should I Do?&lt;/h2&gt;
&lt;p&gt;If your configuration &lt;strong&gt;matches all the above points&lt;/strong&gt;, you can eliminate the vulnerability by performing &lt;strong&gt;any one &lt;/strong&gt;of the following options.&lt;/p&gt;
&lt;h3&gt;Option 1: Install an updated AuthLite version&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;On your DCs and IAS/NPS servers, install v2.0.39 or later from &lt;a href="http://AuthLite.com"&gt;AuthLite.com&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;You must reboot the servers for the modification to become active.  Prior to rebooting, the systems will still be running the old version of the software in memory.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;-- or --&lt;/p&gt;
&lt;h3&gt;Option 2: Add VPN servers to Forced 2-factor Computers&lt;/h3&gt;
&lt;p&gt;If you cannot install a new AuthLite version at this time, you can work around the issue by adding all IAS/NPS servers into AuthLite's "Forced 2-Factor Computers" list.&lt;/p&gt;
&lt;p&gt;NOTES:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt; This will cause all AuthLite user accounts to require 2-factor credentials when they attempt to access the IAS/NPS servers over any protocol (console, RDP, etc.)&lt;/li&gt;
&lt;li&gt;Configuration updates take up to 20 minutes to apply, in addition to any inter-site replication delays.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;-- or --&lt;/p&gt;
&lt;h3&gt;Option 3:&lt;/h3&gt;
&lt;p&gt;If you cannot install a new AuthLite version at this time, you can work around the issue by changing the "Replay Behavior" setting from "Retry" to "Fail".&lt;/p&gt;
&lt;p&gt;NOTES:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;This may break the functionality of benign 1-factor software that is currently able to use stale/expired 2-factor credentials seamlessly.  These credentials will be rejected instead of succeeding as if they were entered as 1-factor logons.&lt;/li&gt;
&lt;li&gt;For example: Outlook 2013 sends the same credentials used during desktop logon over to the Exchange server.  You may be authenticating with 2-factor credentials at the desktop, but Exchange server sees the OTP as stale.  Setting the Replay Behavior to "Fail" will cause Outlook single sign-on to fail, and a credential prompt to pop up.  The same behavior will be observed for all software that attempts to use the NTLM "Windows Integrated" logons.&lt;/li&gt;
&lt;li&gt;Configuration changes take up to 20 minutes to apply, in addition to any inter-site replication delays.&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;Common Questions and Answers&lt;/h2&gt;
&lt;h4&gt;Should I upgrade from v1.x to version 2?&lt;/h4&gt;
&lt;p&gt;No, you do not need to do this.  Version 2 is a much more complex product and a proper upgrade requires a substantial amount of planning, configuration, and testing.  We even &lt;a href="#" title="AuthLite Store"&gt;offer professional support&lt;/a&gt; just to help with this.  In short, it's not something to be undertaken lightly. &lt;/p&gt;
&lt;h4&gt;Where do I have to install the update?&lt;/h4&gt;
&lt;p&gt;Install the updated software on all Domain Controllers and IAS/NPS servers that currently have AuthLite installed.&lt;/p&gt;
&lt;h4&gt;If I change my configuration with Option 2 or 3, do I have to install the upgrade?&lt;/h4&gt;
&lt;p&gt;No, you can continue using your existing build 2.0.18-2.0.38 if you deploy a configuration change (option 2 or 3) to bypass the issue.&lt;/p&gt;
&lt;h4&gt;I need help with this, what should I do?&lt;/h4&gt;
&lt;p&gt;If you require further details, or assistance with installing the update or making configuration changes, please open a Support Request from our &lt;a href="/support" title="Support"&gt;Support&lt;/a&gt; page and reference Upgrade Advisory #2&lt;/p&gt;</description>
      <a10:updated>2015-02-23T01:05:55Z</a10:updated>
    </item>
    <item>
      <guid isPermaLink="false">1510</guid>
      <link>http://azure.authlite.com/kb/authlite-upgrade-advisory-3</link>
      <title>AuthLite Upgrade Advisory #3</title>
      <description>&lt;h2&gt;Overview&lt;/h2&gt;
&lt;p&gt;On November 25, 2014, Collective Software identified an issue with some LDAP clients where a &lt;em&gt;valid&lt;/em&gt; 2-factor authentication could impersonate a &lt;em&gt;different&lt;/em&gt; user account on the LDAP client.&lt;/p&gt;
&lt;p&gt;To eliminate any potential for users authenticating as other users, please check whether your configuration is affected, and deploy the new build.&lt;/p&gt;
&lt;h2&gt;Affected AuthLite Versions&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;AuthLite version 1.x: &lt;strong&gt;not affected&lt;/strong&gt;. You don't need to do anything, apart from make sure you have already updated for the older &lt;a href="/kb/authlite-upgrade-advisory-1" title="AuthLite Upgrade Advisory #1"&gt; Advisory #1&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;AuthLite version 2.0.1-2.0.56: &lt;strong&gt;potentially affected&lt;/strong&gt;, see below for configuration details. &lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;Affected Configurations&lt;/h2&gt;
&lt;p&gt;If your configuration matches the following points, then it may be possible for a valid 2-factor authenticated user to impersonate other users, and AuthLite should be updated.&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;You have one or more third-party (non-Microsoft) services or appliances that act as LDAP clients in order to authenticate Active Directory users.&lt;/li&gt;
&lt;li&gt;You require 2-factor AuthLite authentication for at least some users on those LDAP-enabled systems.&lt;/li&gt;
&lt;li&gt;The LDAP-enabled systems use "simple bind" instead of "Negotiate".  You may not be able to easily determine whether this is the case, so it's best to just upgrade if #1 and #2 are true.&lt;/li&gt;
&lt;/ol&gt;
&lt;h2&gt;What Should I Do?&lt;/h2&gt;
&lt;p&gt;You can eliminate this issue by performing the following action:&lt;/p&gt;
&lt;h3&gt;Install an updated AuthLite version&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;Upgrade your DCs to v2.0.57 or later from &lt;a href="http://AuthLite.com"&gt;AuthLite.com&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;You must reboot the DCs for the modification to become active.  Prior to rebooting, the systems will still be running the old version of the software in memory.&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;Common Questions and Answers&lt;/h2&gt;
&lt;h4&gt;What is my exposure? Could this issue allow outside users in to my systems?&lt;/h4&gt;
&lt;p&gt;No, this issue cannot grant any access to external malicious users.  Only a &lt;em&gt;valid&lt;/em&gt; AuthLite user in your domain who logs in with their correct OTP token and correct password could potentially impersonate a &lt;em&gt; different&lt;/em&gt; user account than their real one.  Whether this incorrect impersonation occurs also depends on the implementation of the LDAP client software in the third-party service/appliance.&lt;/p&gt;
&lt;h4&gt;Should I upgrade from v1.x to version 2?&lt;/h4&gt;
&lt;p&gt;No, you do not need to do this.  Version 2 is a much more complex product and a proper upgrade requires a substantial amount of planning, configuration, and testing.  We offer &lt;a href="#" title="AuthLite Store"&gt;professional services&lt;/a&gt; just to help with this.  In short, it's not something to be undertaken lightly. &lt;/p&gt;
&lt;h4&gt;Where do I have to install the update??&lt;/h4&gt;
&lt;p&gt;Install the updated software on all Domain Controllers that currently have AuthLite installed.&lt;/p&gt;
&lt;h4&gt;I need help with this, what should I do?&lt;/h4&gt;
&lt;p&gt;If you require further details, or assistance with installing the update, please open a Support Request from our &lt;a href="/support" title="Support"&gt;Support page&lt;/a&gt; and reference Upgrade Advisory #3&lt;/p&gt;</description>
      <a10:updated>2015-02-23T01:11:59Z</a10:updated>
    </item>
    <item>
      <guid isPermaLink="false">1511</guid>
      <link>http://azure.authlite.com/kb/configuring-cisco-asa-to-use-ms-chapv2-with-authlite</link>
      <title>Configuring Cisco ASA to use MS-CHAPv2 with AuthLite</title>
      <description>&lt;h2&gt;If using the AuthLite RADIUS service&lt;/h2&gt;
&lt;p&gt;AuthLite's RADIUS service expects two-factor authentication requests to use the MS-CHAPv2 protocol, but there is no obvious way to turn this on in a Cisco ASA.&lt;/p&gt;
&lt;p&gt;These instructions assume Cisco ASDM v6.2 but can be easily generalized by an IOS expert.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;In the "AAA Server" configuration dialog for your RADIUS server, you should select the "Microsoft CHAPv2 Capable" checkbox. But this alone won't make the ASA use this protocol.&lt;/li&gt;
&lt;li&gt;In the "Connection Profile" (tunnel group), navigate to Advanced -&amp;gt; General, and select "Enable password management". Even though we are not working with password reset/expiration at all, this setting is required in order to make the ASA use MS-CHAPv2.&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;If using the IAS/NPS plugin (AuthLite v1.2 or higher)&lt;/h2&gt;
&lt;p&gt;You don't need to worry about this-- you can simply use a PAP connection rule in IAS/NPS, since this is what most RADIUS clients expect.&lt;/p&gt;
&lt;p&gt;The Cisco VPN client (unless grossly misconfigured) will be using IPsec so it is not necessary to use MS-CHAPv2. (In a basic PPTP tunnel, by contrast, MS-CHAPv2 must be used to protect the confidentiality of the passwords and secure the VPN tunnel.)&lt;/p&gt;</description>
      <a10:updated>2015-02-23T01:14:53Z</a10:updated>
    </item>
    <item>
      <guid isPermaLink="false">1512</guid>
      <link>http://azure.authlite.com/kb/general-access-denied-error-on-install</link>
      <title>General Access Denied error on install</title>
      <description>&lt;p&gt;When installing AuthLite on the first domain controller in your organization you receive a pop-up "General access denied error"&lt;/p&gt;
&lt;p&gt;The documentation specifies that you must be a member of "Domain Admins" but you also need to be a member of "Schema Admins".&lt;/p&gt;
&lt;p&gt;The first installation on a DC must add elements and attributes to the schema so that the AuthLite Partition can be set up. If your account is not a member of Schema Admins (by default a domain admin is not a schema admin!) then you need to have it added, or use another appropriate account.&lt;/p&gt;
&lt;p&gt;Remember if you add your account to this group you must &lt;em&gt;log out&lt;/em&gt; and log back in to get an updated token, or else you will not see any difference.&lt;/p&gt;
&lt;p&gt;If your account is a member of domain and schema admins and you receive this error, it is usually caused by a disagreement between DC's about which system has the FSMO Schema Master role. We have seen it occur in cases where the old role holder has gone offline, and one or more new DC's were later added. Seizing the schema role to an active DC may resolve the issue.&lt;/p&gt;
&lt;p&gt;Note: AuthLite schema additions only affect our own Application Partition, and do not make &lt;em&gt;any&lt;/em&gt; changes to built-in AD objects. The additions will have no adverse or performance effect on your directory.&lt;/p&gt;</description>
      <a10:updated>2015-02-23T01:17:25Z</a10:updated>
    </item>
    <item>
      <guid isPermaLink="false">1513</guid>
      <link>http://azure.authlite.com/kb/install-authlite-without-gina-credential-tile</link>
      <title>Install AuthLite without GINA-Credential tile</title>
      <description>&lt;p&gt;In some limited cases, you may wish to install AuthLite without the GINA / Credential Provider extension. This allows you to use the network access features of AuthLite without showing an altered UI experience to your users and admins for console logins.&lt;/p&gt;
&lt;p&gt;In AuthLite version 1.1, the UI added a dropdown field and changed the visual appearance of the logon screen. In version 1.2, the UI uses the default Microsoft interface with a tool-tip balloon added which offers AuthLite instructions.&lt;/p&gt;
&lt;p&gt;For either version, to omit the UI extensions during install, perform the following procedure:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Instead of launching the setup .exe visually, go into a command prompt and CD to the installer's folder&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Type one of the following depending on your platform:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;AuthLite_Setup_Win32.exe SKIPGINA=1&lt;/li&gt;
&lt;li&gt;AuthLite_Setup_x64.exe SKIPGINA=1&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;You must do this any time you install or upgrade AuthLite, or else the UI extension will be installed.&lt;/p&gt;
&lt;/li&gt;
&lt;/ol&gt;</description>
      <a10:updated>2015-02-23T01:19:04Z</a10:updated>
    </item>
    <item>
      <guid isPermaLink="false">1514</guid>
      <link>http://azure.authlite.com/kb/install-error-the-directory-service-is-busy</link>
      <title>Install error: The directory service is busy</title>
      <description>&lt;p&gt;When installing AuthLite on a Domain Controller, you receive a popup error stating:&lt;/p&gt;
&lt;p style="padding-left: 30px;"&gt;Error while executing custom action: The directory service is busy.&lt;/p&gt;
&lt;p&gt;and the install rolls back.&lt;/p&gt;
&lt;p&gt;Each DC install runs a custom action which saves the latest definitions of the AuthLite objects to the AD schema. Even if you have the latest schema already and no changes need to be applied, AD may throw this error.&lt;/p&gt;
&lt;h2&gt;First steps&lt;/h2&gt;
&lt;p&gt;First, before troubleshooting AuthLite, you should make sure that there are no replication issues between your schema master and the DC you are installing on. When we get this condition in our test lab with VMs, sometimes restarting the Active Directory services on each of the DCs clears the error.&lt;/p&gt;
&lt;p&gt;Apart from that, here are some ways to try and resolve this condition:&lt;/p&gt;
&lt;h2&gt;Option 1: Add registry key to the schema master&lt;/h2&gt;
&lt;p&gt;Support staff note: This procedure allegedly affects only Windows 2000, but we have repeated reports that it helped resolve the problem on 2003 and 2008 servers.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Determine the schema master, and add a registry key signifying that schema changes are allowed. This procedure is outlined in this &lt;a href="http://support.microsoft.com/kb/216060/EN-US/"&gt;Microsoft KB article&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;You must do the above &lt;strong&gt;on the schema master&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;Re-try the install.&lt;/li&gt;
&lt;li&gt;If you still get the failure, please &lt;a href="/support" title="Support"&gt;contact support&lt;/a&gt; and we can assist you.&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;Option 2: Manual schema installation&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;Please see &lt;a href="/kb/manual-schema-additions" title="Manual Schema Additions"&gt;this article&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description>
      <a10:updated>2015-02-23T01:24:59Z</a10:updated>
    </item>
    <item>
      <guid isPermaLink="false">1515</guid>
      <link>http://azure.authlite.com/kb/manual-schema-additions</link>
      <title>Manual Schema Additions</title>
      <description>&lt;p&gt;By default, AuthLite's installer automatically adds the lastest revision of its own items and attributes to your AD schema. If needed, you can execute these changes manually instead.&lt;/p&gt;
&lt;h2&gt;Step 1:&lt;/h2&gt;
&lt;p&gt;Obtain the most current LDIF files for your AuthLite version, by creating a &lt;a href="/support" title="Support"&gt;support request&lt;/a&gt; and asking for them.&lt;/p&gt;
&lt;h2&gt;Step 2:&lt;/h2&gt;
&lt;p&gt;Bring the LDIF files to the Schema Master, and open a command prompt in the same folder. Enter the following commands:&lt;/p&gt;
&lt;pre&gt;ldifde -k -i -f AuthLiteSchemaTemplate-Attributes.ldif -c {BaseDN} CN=Schema,CN=Configuration,&amp;lt;dc=sandbox,dc=local&amp;gt; 
ldifde -k -i -f AuthLiteSchemaTemplate.ldif -c {BaseDN} CN=Schema,CN=Configuration,&amp;lt;dc=sandbox,dc=local&amp;gt; 
&lt;/pre&gt;
&lt;p&gt;NOTE: In the above commands you must replace the "&lt;strong&gt;&amp;lt;dc=sandbox,dc=local&amp;gt;"&lt;/strong&gt; portions with the LDAP syntax distinguished directory context of &lt;strong&gt;YOUR&lt;/strong&gt; domain. (It will be the FQDN of your domain with "DC=" before each part, and a comma in place of each period.)  Do not keep the "&amp;lt;" and "&amp;gt;" characters in the resulting command, they are just there to show you which part must be changed. &lt;/p&gt;
&lt;p&gt;If no errors are reported, proceed to step 3.&lt;/p&gt;
&lt;h2&gt;Step 3:&lt;/h2&gt;
&lt;p&gt;Now that you know the schema elements are updated you can run the AuthLite setup program and tell it NOT to run the schema installer. You do this by specifying the argument CREATESCHEMA=0:&lt;/p&gt;
&lt;h4&gt;Version 2:&lt;/h4&gt;
&lt;pre&gt;AuthLite_installer_(x86 or x64).msi CREATESCHEMA=0 &lt;/pre&gt;
&lt;h4&gt;Version 1.x:&lt;/h4&gt;
&lt;pre&gt;AuthLite_Setup_(Win32 or x64).exe CREATESCHEMA=0 &lt;/pre&gt;</description>
      <a10:updated>2015-02-23T01:26:31Z</a10:updated>
    </item>
    <item>
      <guid isPermaLink="false">1516</guid>
      <link>http://azure.authlite.com/kb/installation-on-quot-server-core-quot</link>
      <title>Installation on quot Server Core quot</title>
      <description>&lt;p&gt;AuthLite can be installed on 2008 Server Core R2, but not R1 because it lacks the .NET framework&lt;/p&gt;
&lt;p&gt;If your organization uses Server Core to run domain controllers, and AuthLite users will be authenticating to those DC's, then it is necessary to install the AuthLite software on those DC's.&lt;/p&gt;
&lt;p&gt;It is not possible to install AuthLite on the 2008 Server Core R1 product from Microsoft, because it does not include or support Microsoft's .NET framework.&lt;/p&gt;
&lt;p&gt;In Core R2 you can install AuthLite by first installing the .NET prerequisites with the following commands:&lt;/p&gt;
&lt;pre&gt;start /w ocsetup NetFx2-ServerCore start /w ocsetup NetFx2-ServerCore-WOW64 &lt;/pre&gt;
&lt;p&gt;Then launch the AuthLite setup file:&lt;/p&gt;
&lt;h4&gt;Version 1.x:&lt;/h4&gt;
&lt;pre&gt;AuthLite_Setup_x64.exe &lt;/pre&gt;
&lt;h4&gt;Version 2:&lt;/h4&gt;
&lt;pre&gt;AuthLite_installer_x64.msi&lt;/pre&gt;</description>
      <a10:updated>2015-02-23T01:29:24Z</a10:updated>
    </item>
    <item>
      <guid isPermaLink="false">1517</guid>
      <link>http://azure.authlite.com/kb/migrating-authlite-integrated-users-to-version-2</link>
      <title>Migrating AuthLite Integrated users to version 2</title>
      <description>&lt;p&gt;AuthLite version 1 customers who have Integrated users need to perform these extra steps before migrating to a version 2 install.&lt;/p&gt;
&lt;h2&gt;Overview&lt;/h2&gt;
&lt;p&gt;This article first describes the security models for user authentication and endpoint protection between AuthLite versions 1 and 2 at a high level. Then information is provided about planning and executing an upgrade to a version 2 environment.&lt;/p&gt;
&lt;h2&gt;Limitations of AuthLite v1 Endpoint Security&lt;/h2&gt;
&lt;p&gt;AuthLite version 1 provides secure logon for endpoint workstations by leveraging "Integrated users". These accounts use a special augmented static secret as the account's AD password. This secret is never stored, and can only be generated by combining the user's plaintext password and a decrypted YubiKey one-time passcode. There are some important ramifications of relying on this approach:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;Even though the augmented static secret is never stored anywhere, it gets assembled by the security core of each workstation each time the user authenticates. The domain controller processes the one-time passcode authentication and returns its cryptographic results to the workstation. That means any software running on the workstation with system-level privileges could theoretically see this value. A malicious workstation could collect the augmented secret and bypass the one-time passcode authentication factor in the future. This collected static value could also be used on other systems by an attacker in lieu of two-factor authentication, and the domain controller could not detect the difference.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;In order to support offline (cached) logon, the workstations must store the YubiKey's shared secret so they can decrypt the one-time passcodes. The shared secret is encrypted against disclosure by a key derived from the user's plaintext password. But this is still not ideal since an attacker who can acquire or guess the password and then obtain the workstation's hard drive could bypass the one-time passcode authentication factor.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Since the AD password has been changed (it's the augmented static secret, not what the user types in as their plaintext password) this means there is no way for this account to authenticate anywhere on the domain except for systems and software that are AuthLite-aware. Although that configuration is "secure by default", in practice it is an unacceptable barrier to use for most customers, who wish certain systems and software to continue authenticating AuthLite users with one-factor only.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;AuthLite v2 Endpoint Security Model&lt;/h2&gt;
&lt;p&gt;AuthLite version 2 has a more sophisticated Active Directory authentication subsystem. This allows us to dispense with the distinction between "Integrated" and "Split" users. Version 2 accounts have normal passwords whose hashes are stored in AD in the default Microsoft fashion. The domain controller makes the decision whether to allow or deny each authentication attempt based on the presence of a valid one-time passcode. This has the following ramifications:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;Nothing seen by the workstation could be used to gain access to future sessions. The domain controller is making the ultimate decision each time an authentication is performed, so it can accept or reject the credentials properly. There is no augmented static secret anywhere in this model.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Version 2 software on the DC and workstation provides more secure cached/offline logons. The YubiKey challenge/response mode is used to encrypt a randomly chosen secret key that must be provided in order to decrypt the cached logon record and DPAPI keys. A new random secret is chosen each time the user authenticates to the workstation when it is online. This model means that in order to log in, an attacker would not only need the user's password, but access to the hard drive, followed by access to the YubiKey. Additionally, any partial disclosure is likely to be short-lived since the secrets are changed regularly. Finally, each secret is only useful for the workstation on which it was generated.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Logons work as one-factor by default, unless constrained by administrators. Compared to the limitations in v1, admins have finer-grained control over what systems and processes will require two-factor authentication.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;WARNING: Domain controllers that do not have the AuthLite software installed will process all authentications as one-factor. They will reject AuthLite two-factor authentications, and they will ALLOW users to authenticate with one-factor even if you do not wish them to. All DCs should be made AuthLite-aware to avoid this situation. This warning may not necessarily apply if your two-factor users only log in via RADIUS or some other constrained subsystem where they are always funneled to an AuthLite-aware server.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;Considerations for AuthLite version 1 customers before upgrading&lt;/h2&gt;
&lt;p&gt;If you only use Split-mode users in your version 1 deployment then your users can continue to use their existing YubiKeys in the same manner they have in the past. Read the v2 manual because replay windows and 2-factor forcing work quite differently and you will probably need to make configuration changes.&lt;/p&gt;
&lt;p&gt;If you have Integrated users then at a minimum you will have to contend with these hurdles:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Integrated user records must be altered to split-mode in order for the installation to proceed (see below).&lt;/li&gt;
&lt;li&gt;Currently active Integrated users will not be able to log in until their passwords are administratively reset, because v2 does not create or use augmented password values like v1.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Additional considerations for YubiKeys to support offline logons:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Your YubiKeys need to be reprogrammed if you intend to use them to log on to offline workstations, because the old records will not have challenge/response secrets associated with them either in the keys or the data store.&lt;/li&gt;
&lt;li&gt;Your YubiKeys could be too old to program with challenge/response. The oldest supported YubiKey model is version 2.1.  (YubiKey firmware cannot be updated.)&lt;/li&gt;
&lt;li&gt;If you are using the second configuration slot on your keys for something unrelated to AuthLite, that identity will be need to be OVERWRITTEN by the version 2 key programmer. Without the C/R identity in slot 2, it will not be possible to log on to offline workstations with that key.&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;Prerequisite for upgrading from version 1 to version 2&lt;/h2&gt;
&lt;p&gt;WARNING: This process will cause the destruction of your current data records. If you have any possibility of taking the environment back to version 1, you MUST make a backup of all records in the Data Manager before proceeding.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Go into the AuthLite Data Manager and remove any key records that show "Integrated" unless you want to continue using those keys without offline logon support.&lt;/li&gt;
&lt;li&gt;Open ADSI Edit and Connect to the tree "DC=AuthLite,[DC=your,DC=domain,DC=fqdn,DC=here]" where the bracketed value is replaced with your domain's FQDN such as "DC=sandbox,DC=collectivesoftware,DC=com" for "sandbox.collectivesoftware.com"&lt;/li&gt;
&lt;li&gt;Go into the AuthLiteHashes section, and delete all records under it. This will remove the Integrated flag from the records and make them v2 compatible. See above for notes about mandatory password resets!&lt;/li&gt;
&lt;/ul&gt;</description>
      <a10:updated>2015-02-23T01:44:42Z</a10:updated>
    </item>
    <item>
      <guid isPermaLink="false">1518</guid>
      <link>http://azure.authlite.com/kb/openvpn-access-server-configuration</link>
      <title>OpenVPN Access Server Configuration</title>
      <description>&lt;p&gt;This article describes the configurations needed to make OpenVPN Access Server work with AuthLite.&lt;/p&gt;
&lt;h2&gt;New way (separate OTP field)&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;Configure OpenVPN authentication to use LDAP to Active Directory, and make sure it works with username/password only.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Set up a domain member or DC as follows:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Install NPS server role&lt;/li&gt;
&lt;li&gt;Create NPS Radius client matching the OpenVPN-AS server's IP. Create a shared secret.&lt;/li&gt;
&lt;li&gt;Set up appropriate Connection Request Policy (the default "use windows authentication for all users" is fine)&lt;/li&gt;
&lt;li&gt;Set up appropriate Network Policy to grant access to the Windows Group "AuthLite Users", allow PAP authentication.&lt;/li&gt;
&lt;li&gt;install AuthLite on NPS server and restart&lt;/li&gt;
&lt;li&gt;Enable AuthLite's NPS plugin to One-factor PAP mode, selecting "Permit requests that don't send the domain name"&lt;/li&gt;
&lt;li&gt;Restart AuthLite service and NPS service&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;Log into the OpenVPN-AS appliance and enter:&lt;/li&gt;
&lt;/ul&gt;
&lt;pre&gt;cd /usr/local/openvpn_as/scripts&lt;br /&gt;wget https://s3.authlite.com/downloads/ovpnas_postauth_cr.py&lt;br /&gt;wget https://raw.githubusercontent.com/pyradius/pyrad/master/example/dictionary&lt;br /&gt;wget https://raw.githubusercontent.com/pyradius/pyrad/master/example/dictionary.freeradius&lt;/pre&gt;
&lt;p&gt;Edit the ovpnas_postauth_cr.py file and change the following values to match your NPS server:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;RADIUS_SERVER&lt;/li&gt;
&lt;li&gt;RADIUS_SECRET&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Now run the following commands to load the script and restart the service:&lt;/p&gt;
&lt;pre&gt;./sacli -k auth.module.post_auth_script --value_file=ovpnas_postauth_cr.py ConfigPut &lt;br /&gt;./sacli start&lt;/pre&gt;
&lt;p&gt;After this configuration, the OpenVPN web logon and VPN client should show an additional dialog after submitting the username and password.  The new dialog will request "AuthLite OTP" (this is configurable in the ovpnas_postauth_cr.py file), and the user will have to enter a valid OTP to proceed.&lt;/p&gt;
&lt;h2&gt;Old way (no separate field)&lt;/h2&gt;
&lt;p&gt;The OpenVPN Access Server (OpenVPN-AS) uses the username field to create and push configuration files. This means it cannot tolerate an AuthLite OTP in the username field by default. To work around this problem you can either:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;
&lt;p&gt;Use RADIUS PAP and enter credentials as follows:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;Username in the Username field&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Password and OTP together in the password field&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Use AuthLite 1.2.25 or later and add a "post auth" script to the VPN server to make it tolerate an OTP in the username field. This is accomplished by making the VPN software use the username returned by AuthLite as the canonical username for its internal operations.&lt;/p&gt;
&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;The remainder of this article contains the steps needed to configure option #2.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;From a shell on the VPN server, cd to /usr/local/openvpn_as/scripts&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Create the file authlite.py, with the following contents:&lt;br /&gt; &lt;span style="font-family: monospace;"&gt;  import json&lt;/span&gt;&lt;br /&gt; &lt;span style="font-family: monospace;"&gt;  from pyovpn.plugin import *&lt;/span&gt;&lt;br /&gt; &lt;br /&gt; &lt;span style="font-family: monospace;"&gt;  def post_auth(authcred, attributes, authret, info):&lt;/span&gt;&lt;br /&gt; &lt;br /&gt; &lt;span style="font-family: monospace;"&gt;      if info.get('auth_method') in ('session', 'autologin'):&lt;/span&gt;&lt;br /&gt; &lt;span style="font-family: monospace;"&gt;          return authret&lt;/span&gt;&lt;br /&gt; &lt;br /&gt; &lt;span style="font-family: monospace;"&gt;      if 1 in info['radius_reply']:&lt;/span&gt;&lt;br /&gt; &lt;span style="font-family: monospace;"&gt;          ul = info['radius_reply'][1]&lt;/span&gt;&lt;br /&gt; &lt;span style="font-family: monospace;"&gt;          us = ''.join(ul)&lt;/span&gt;&lt;br /&gt; &lt;span style="font-family: monospace;"&gt;          u = us.split("\\")[-1]&lt;/span&gt;&lt;br /&gt; &lt;span style="font-family: monospace;"&gt;          authret['user'] = u&lt;/span&gt;&lt;br /&gt; &lt;br /&gt; &lt;span style="font-family: monospace;"&gt;      return authret&lt;/span&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Execute the following command, substituting your VPN admin username if it is not "openvpn":&lt;/p&gt;
&lt;pre&gt; ./sacli -a openvpn -k auth.module.post_auth_script --value_file=authlite.py ConfigPut &lt;/pre&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Execute the following command, substituting your VPN admin username if it is not "openvpn":&lt;/p&gt;
&lt;pre&gt; ./sacli -a openvpn start &lt;/pre&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Note that the script executes from a copy stored directly in the configuration database, NOT the .py file. So if you change the py file you need to ConfigPut it again in order for your changes to be picked up.&lt;/p&gt;
&lt;p&gt;You can use the sacli command with the ConfigDel option if you need to remove the script.&lt;/p&gt;
&lt;p&gt;See /usr/local/openvpn_as/doc/post_auth/post_auth.txt for more information.&lt;/p&gt;</description>
      <a10:updated>2015-02-23T01:47:32Z</a10:updated>
    </item>
    <item>
      <guid isPermaLink="false">1519</guid>
      <link>http://azure.authlite.com/kb/program-a-key-over-rdp</link>
      <title>Program a key over RDP</title>
      <description>&lt;p&gt;NOTE: This KB is for an outdated version of AuthLite.&lt;/p&gt;
&lt;p&gt;Please see this sequence of pages for more updated instructions:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="/docs/2_4/id_1142456219/"&gt;Program token &lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="/docs/2_4/id_268561548/"&gt;Import token&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="/docs/2_4/id_1432569501/"&gt;Assign token&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p&gt;Normally AuthLite keys can only be programmed when directly connected to the computer running the configuration program, not over remote desktop. There is a work around.&lt;/p&gt;
&lt;h2&gt;Overview&lt;/h2&gt;
&lt;p&gt;For normal login, and changing passwords after your account is already AuthLite Integrated, the hardware keys (yubikeys) work normally over RDP.&lt;/p&gt;
&lt;p&gt;But two situations require special attention over RDP:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;When you are &lt;em&gt;first setting up &lt;/em&gt; your user account as AuthLite Integrated, in the "change password" screen&lt;/li&gt;
&lt;li&gt;When you are using the AuthLite configuration dialog to set up &lt;em&gt;extra keys &lt;/em&gt; or &lt;em&gt;Web/VPN &lt;/em&gt; (split) keys&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;If you attempt to do one of the above procedures in an RDP session, you will receive an error that there is no key plugged in. These programs can only write to the yubikey when it is plugged in to a USB port they can see. Over an RDP session, the yubikey is not actually connected to the remote system, only its keystrokes are sent. This is good enough to &lt;em&gt;use &lt;/em&gt; the key, but not enough to program it.&lt;/p&gt;
&lt;h2&gt;Solution: Program keys remotely&lt;/h2&gt;
&lt;ol&gt;
&lt;li&gt;Install the Key Programmer bundle to your local workstation: &lt;a href="http://s3.collectivesoftware.com/downloads/authlite/KeyProgrammer_installer_x86.msi"&gt;32-bit programmer&lt;/a&gt; or &lt;a href="http://s3.collectivesoftware.com/downloads/authlite/KeyProgrammer_installer_x64.msi"&gt;64-bit programmer&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Set slot 1 to AuthLite OTP.&lt;/li&gt;
&lt;li&gt;Set slot 2 to "do nothing"&lt;/li&gt;
&lt;li&gt;on the next tab, plug in yubikey&lt;/li&gt;
&lt;li&gt;when detected, go to the next tab and yubikey slot 1 will be programmed for AuthLite&lt;/li&gt;
&lt;li&gt;Each new key you plug in will be programmed&lt;/li&gt;
&lt;li&gt;click Finish and save the XML&lt;/li&gt;
&lt;li&gt;this can be imported into the v1.2.25 (or later) Data Manager app&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;Now all the data for the keys has been added. The procedure to integrate a new user with a &lt;strong&gt;pre-programmed &lt;/strong&gt; key is slightly different than for a blank key.&lt;/p&gt;
&lt;p&gt;Steps the user performs:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Plug in the (already programmed) key to a USB port on your RDP client machine.&lt;/li&gt;
&lt;li&gt;In the RDP session, press ctrl-alt-end to bring up the security screen, and go to Change Password.&lt;/li&gt;
&lt;li&gt;Instead of typing the username, tap the AuthLite key into the first field.&lt;/li&gt;
&lt;li&gt;Fill out the old and new password fields.&lt;/li&gt;
&lt;li&gt;Select the checkbox "Use AuthLite with this account"&lt;/li&gt;
&lt;li&gt;Click OK.&lt;/li&gt;
&lt;li&gt;The key will now become associated to that user, and their account will be integrated with AuthLite.&lt;/li&gt;
&lt;/ol&gt;</description>
      <a10:updated>2015-02-23T01:53:18Z</a10:updated>
    </item>
    <item>
      <guid isPermaLink="false">1520</guid>
      <link>http://azure.authlite.com/kb/rdp-and-network-level-authentication</link>
      <title>RDP and Network Level Authentication</title>
      <description>&lt;p&gt;The RDP client version 6 and later collect credentials before establishing a remote session. AuthLite credentials must be entered into the RDP client before the connection is made.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Please see the AuthLite administrator guide for configuration steps needed on the domain controller (in particular, setting up a Replay Window)&lt;/li&gt;
&lt;li&gt;If you are using TSG, make sure AuthLite is installed on the TSG server as well&lt;/li&gt;
&lt;li&gt;If you are publishing TSG through ISA or TMG, please see the AuthLite administrator guide for configuration steps.&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;Connect to an RDP session as an AuthLite user&lt;/h2&gt;
&lt;ol&gt;
&lt;li&gt;Open mstsc (the RDP client) and enter the server you wish to connect to.&lt;/li&gt;
&lt;li&gt;Click Connect.&lt;/li&gt;
&lt;li&gt;When the logon dialog opens, select the Username field, and tap your AuthLite key there instead of entering the username.&lt;/li&gt;
&lt;li&gt;Enter your password into the password field.&lt;/li&gt;
&lt;li&gt;Connect.&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;The reason you must enter the OTP into the username field is that RDP hashes the contents of the password field immediately at the client. So by the time the server gets the credentials, the OTP has been destroyed by the hashing operation. In contrast, the username field is sent to the server in clear text, so the OTP can be transmitted in this field.&lt;/p&gt;</description>
      <a10:updated>2015-02-23T01:58:14Z</a10:updated>
    </item>
    <item>
      <guid isPermaLink="false">1521</guid>
      <link>http://azure.authlite.com/kb/service-marked-for-deletion</link>
      <title>Service marked for deletion</title>
      <description>&lt;p&gt;If your installer fails with this error, close all instances of the Services control pannel mmc.exe. Then run the installation again.&lt;/p&gt;</description>
      <a10:updated>2015-02-23T02:00:18Z</a10:updated>
    </item>
    <item>
      <guid isPermaLink="false">1522</guid>
      <link>http://azure.authlite.com/kb/share-authlite-key-across-multiple-domains-or-standalone-machines</link>
      <title>Share AuthLite key across multiple domains or standalone machines</title>
      <description>&lt;h2&gt;Overview&lt;/h2&gt;
&lt;p&gt;Within a domain, a user can use their AuthLite keys easily across any system, because the authentication is performed by Active Directory. But between two domains or standalone (non-domain) machines, even if you have the same "username and password" on each system, using the same AuthLite key requires extra effort.&lt;/p&gt;
&lt;p&gt;There are two main concepts to understand before proceeding:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;AuthLite cannot automatically send authentication data between two domains or standalone systems, the way it can within a single domain between domain controllers and domain-joined systems. This means in order to share one key, you will have to manually copy that key's record to each domain or system.&lt;/li&gt;
&lt;li&gt;By default, whenever you integrate an account to an AuthLite key, the old program on that key (if any) in ERASED. Therefore when you set up the same key across several domains or systems, you must be careful to only program the key ONCE, on the first system. Then, follow the special procedure described below on each additional domain or system. The AuthLite software will warn you if you attempt to overwrite a key's program. Please heed these warnings and make sure you understand what you are doing.&lt;/li&gt;
&lt;/ol&gt;
&lt;h2&gt;Security Considerations&lt;/h2&gt;
&lt;p&gt;Part of the security of AuthLite is provided by the one-time nature of the AuthLite keys. Pressing a key generates a one-time password (OTP) and that value need not be held secret because use of the same value in the future would be rejected by the system as a replay. However, when you share one key across several independent authorities as we will show here, the security of the system is weakened in the following manner.&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p&gt;Consider standalone SystemA and SystemB which both honor the same AuthLite key. If you log on to SystemA with an OTP and your password, then SystemA will know this OTP value should be considered a replay in the future. However SystemB has no knowledge that this value was used on SystemA. Therefore, an eavesdropper on your logon session to SystemA could take this OTP value and use it on SystemB without being rejected. If your plain text passwords are ALSO the same on each machine, then the attacker now has sufficient information to completely impersonate you on SystemB.&lt;/p&gt;
&lt;p&gt;This issue can be partially mitigated by making sure you use different plain text passwords on each standalone system. But even with this precaution, the total security of the system is lower when the same key is shared across several authorities in this fashion. (It's still far more secure than using a password alone however).&lt;/p&gt;
&lt;h2&gt;Prerequisites&lt;/h2&gt;
&lt;ol&gt;
&lt;li&gt;This procedure requires AuthLite version 1.2.25 or greater.&lt;/li&gt;
&lt;li&gt;Before starting, thoroughly read Appendix A in the AuthLite administrator's manual and prepare each user account to be recovered in the event of lost access. Beware, even if you are using the same username and password on each domain or system, they are separate accounts and must each be recovered separately. A windows recovery disk/file will only work for the user and computer on which it was created.&lt;/li&gt;
&lt;/ol&gt;
&lt;h2&gt;Procedures&lt;/h2&gt;
&lt;h3&gt;Summary&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;Note:&lt;/strong&gt; Whether you are sharing a key across two domains, or two standalone machines, we will call them "SystemA" and "SystemB". On a domain, the AuthLite Data Manager is only visible from a domain controller. But you can perform the logon and password changes on a workstation (since normal domain users are not allowed to logon to DCs)&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p&gt;Here is an overview of the procedures we will perform. More detailed steps are shown below.&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Integrate a UserA on SystemA with Key1&lt;/li&gt;
&lt;li&gt;Export the data for Key1 and change the XML file to remove the Domain and Username&lt;/li&gt;
&lt;li&gt;Import the modified data file to SystemB&lt;/li&gt;
&lt;li&gt;Set up UserB to use Key1 through the change password screen&lt;/li&gt;
&lt;li&gt;Add a spare Key2 to UserA (on SystemA)&lt;/li&gt;
&lt;li&gt;Export the data for Key2 and change the XML to reflect SystemB and UserB&lt;/li&gt;
&lt;li&gt;Import the modified data file to SystemB&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;In the end, this will yield two keys that can each be used on either domain/machine, for logging in as the appropriate user on that domain/machine.&lt;/p&gt;
&lt;h3&gt;Details: Integrating UserA and sharing the first key&lt;/h3&gt;
&lt;ol&gt;
&lt;li&gt;On SystemA, log on with UserA. If UserA is already using an AuthLite key, go to step 6.&lt;/li&gt;
&lt;li&gt;Plug in a blank AuthLite key, which we will call Key1&lt;/li&gt;
&lt;li&gt;From the Ctrl-Alt-Delete security screen, go to Change Password&lt;/li&gt;
&lt;li&gt;Enter your old and new passwords (or retype the same password if you don't want to change it), and select to set up a new AuthLite key.&lt;/li&gt;
&lt;li&gt;Confirm your account is now integrated with AuthLite by logging out and logging in using Key1 and the password you set for UserA.&lt;/li&gt;
&lt;li&gt;As an administrator, open the AuthLite Data Manager on SystemA&lt;/li&gt;
&lt;li&gt;Select the key record for UserA, and export it using the File-&amp;gt;Export option&lt;/li&gt;
&lt;li&gt;Open the XML file you just saved in Notepad or other text editor.&lt;/li&gt;
&lt;li&gt;Delete the lines containing the "Username" and "Domain" tags and values. We need to clear these out so that when we import the key it will not be associated to any user.&lt;/li&gt;
&lt;li&gt;Save the XML, and bring the modified file to SystemB&lt;/li&gt;
&lt;li&gt;As an administrator, open the AuthLite Data Manager on SystemB&lt;/li&gt;
&lt;li&gt;From File-&amp;gt;Import, import the modified XML file from SystemA&lt;/li&gt;
&lt;li&gt;You should see a new key record with the domain and username stating they are "not set"&lt;/li&gt;
&lt;li&gt;Log on to SystemB with UserB. This must not be an AuthLite user already. If it is, unintegrate it back to password-only before proceeding.&lt;/li&gt;
&lt;li&gt;From the Ctrl-Alt-Delete security screen, go to Change Password&lt;/li&gt;
&lt;li&gt;EXTREMELY IMPORTANT! Instead of leaving the username in the first field, REPLACE this value by tapping Key1 into this field. The checkbox on the screen should change to say "Use AuthLite with this account". We are doing this to tell the system you already have an existing key and don't want to program a new one.&lt;/li&gt;
&lt;li&gt;Enter your old and new passwords (or retype the same password if you don't want to change it), and select the "Use AuthLite" checkbox&lt;/li&gt;
&lt;li&gt;If you receive a warning about reprogramming the key, STOP! Go back two steps and read it again!&lt;/li&gt;
&lt;li&gt;The system will find the unassociated key record and connect it to UserB with the password you have entered.&lt;/li&gt;
&lt;li&gt;Confirm your account is now integrated to AuthLite by logging out and in using Key1 and the password you set for UserB.&lt;/li&gt;
&lt;/ol&gt;
&lt;h3&gt;Details: Adding a second key and sharing it&lt;/h3&gt;
&lt;ol&gt;
&lt;li&gt;On SystemA, log on with UserA using Key1 and UserA's password.&lt;/li&gt;
&lt;li&gt;Open AuthLite Configuration and Select "My Integrated Keys".&lt;/li&gt;
&lt;li&gt;Tap Key1 into the first field "Current AuthLite Key".&lt;/li&gt;
&lt;li&gt;Enter UserA's password in the next field.&lt;/li&gt;
&lt;li&gt;Unplug Key1&lt;/li&gt;
&lt;li&gt;Plug in blank Key2&lt;/li&gt;
&lt;li&gt;Press the "Program" button&lt;/li&gt;
&lt;li&gt;Verify you can log in to SystemA with Key2 and the password for UserA&lt;/li&gt;
&lt;li&gt;As an administrator, open the AuthLite Data Manager on SystemA&lt;/li&gt;
&lt;li&gt;Tap Key2 into the "Find OTP" search box on the top left of the tool.&lt;/li&gt;
&lt;li&gt;Select the key record found, and export it using File-&amp;gt;Export&lt;/li&gt;
&lt;li&gt;Open the XML file you just saved in Notepad or other text editor.&lt;/li&gt;
&lt;li&gt;Change the contents of the "Domain" tag from the name of SystemA to the name of SystemB.&lt;/li&gt;
&lt;li&gt;Change the contents of the "Username" tag from the name of UserA to the name of UserB.&lt;/li&gt;
&lt;li&gt;Save the XML and bring the modified file to SystemB.&lt;/li&gt;
&lt;li&gt;As an administrator, open the AuthLite Data Manager on SystemB.&lt;/li&gt;
&lt;li&gt;Import the modified XML file from SystemA.&lt;/li&gt;
&lt;li&gt;Verify that UserB now has two key records. You can tap Key2 into the "Find OTP" field and make sure it finds a key record.&lt;/li&gt;
&lt;li&gt;Confirm that Key2 is shared properly by logging in to SystemB with Key2 and the password for UserB.&lt;/li&gt;
&lt;/ol&gt;
&lt;h3&gt;Additional domains/machines&lt;/h3&gt;
&lt;p&gt;You can use the files modified from SystemA, and perform the "SystemB" steps on other domains/machines to share the same keys with those as well.&lt;/p&gt;</description>
      <a10:updated>2015-02-23T02:07:21Z</a10:updated>
    </item>
    <item>
      <guid isPermaLink="false">1523</guid>
      <link>http://azure.authlite.com/kb/share-authlite-v2-key-across-multiple-domains</link>
      <title>Share AuthLite v2 key across multiple domains</title>
      <description>&lt;h2&gt;Overview&lt;/h2&gt;
&lt;p&gt;Within a domain, a user can use their AuthLite keys easily across any system, because the authentication is performed by Active Directory. But between two domains, even if you have the same "username and password" on each system, using the same AuthLite key requires extra effort.&lt;/p&gt;
&lt;p&gt;There are two main concepts to understand before proceeding:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;AuthLite cannot automatically send authentication data between two domains, the way it can within a single domain between domain controllers. This means in order to share one key, you will have to manually copy that key's record to each domain.&lt;/li&gt;
&lt;li&gt;By default, whenever you program a YubiKey, the old program on that key (if any) in ERASED. Therefore when you set up the same key across several domains or systems, you must be careful to only program the key ONCE. Then, follow the special procedure described below on each additional domain.&lt;/li&gt;
&lt;/ol&gt;
&lt;h2&gt;Security Considerations&lt;/h2&gt;
&lt;p&gt;Part of the security of AuthLite is provided by the one-time nature of the YubiKey. Pressing a key generates a one-time password (OTP) and that value need not be held secret because use of the same value in the future would be rejected by the system as a replay. However, when you share one key across several independent authorities as we will show here, the security of the system is weakened in the following manner.&lt;/p&gt;
&lt;p&gt;Consider DomainA and DomainB which both honor the same AuthLite key. If you log on to DomainA with an OTP and your password, then DomainA will know this OTP value should be considered a replay in the future. However DomainB has no knowledge that this value was used on DomainA. Therefore, an eavesdropper on your logon session to DomainA could take this OTP value and use it on DomainB without being rejected. If your plain text passwords are ALSO the same on each domain, then the attacker now has sufficient information to completely impersonate you on DomainB.&lt;/p&gt;
&lt;p&gt;This issue can be partially mitigated by making sure you use different plain text passwords on each domain. But even with this precaution, the total security of the system is lower when the same key is shared across several authorities in this fashion. (It's still far more secure than using a password alone however).&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;A better solution for this scenario is to use a time-based OATH token, since there is no counter value that needs to be communicated between the domains.&lt;/strong&gt;&lt;/p&gt;</description>
      <a10:updated>2015-02-23T02:07:47Z</a10:updated>
    </item>
    <item>
      <guid isPermaLink="false">1524</guid>
      <link>http://azure.authlite.com/kb/upgrading-server-2003-to-2008</link>
      <title>Upgrading Server 2003 to 2008</title>
      <description>&lt;h2&gt;In-place upgrade&lt;/h2&gt;
&lt;p&gt;You can perform an in-place upgrade of Windows Server without damaging any AuthLite data stored on your domain.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;For safety, back up the existing key data with the following procedure:
&lt;ul&gt;
&lt;li&gt;Open the AuthLite Data Manager&lt;/li&gt;
&lt;li&gt;Click the domain node for your domain name&lt;/li&gt;
&lt;li&gt;Click into the right pane, and select all records or press ctrl-A&lt;/li&gt;
&lt;li&gt;Go to File-&amp;gt;Export Keys, and save the key data to an XML file&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;You should not need that XML file if all goes well, but put it in a safe place off of the server.&lt;/li&gt;
&lt;li&gt;After completing the Windows upgrade, run the AuthLite installer again and select "Repair". This will refresh shortcuts in the start menu, and other installation settings.&lt;/li&gt;
&lt;li&gt;All AuthLite accounts and settings should remain as they were prior to the upgrade.&lt;/li&gt;
&lt;li&gt;After the upgrade, please REMOVE the backed up XML file, as it contains sensitive OTP data.&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;Migrating to different servers&lt;/h2&gt;
&lt;p&gt;If you will move to entirely new servers instead of doing in-place upgrades of your existing servers, then you must manually migrate the AuthLite data.  However, if you are upgrading domain controllers one at a time and keeping the same domain data throughout the process, you don't need to back up/restore the AuthLite key data from the Data Manager.&lt;/p&gt;
&lt;p&gt;On the old server:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Back up the existing key data with the following procedure:
&lt;ul&gt;
&lt;li&gt;Open the AuthLite Data Manager&lt;/li&gt;
&lt;li&gt;Click the domain node for your domain name&lt;/li&gt;
&lt;li&gt;Click into the right pane, and select all records or press ctrl-A&lt;/li&gt;
&lt;li&gt;Go to File-&amp;gt;Export Keys, and save the key data to an XML file&lt;/li&gt;
&lt;li&gt;Note that if you are upgrading domain controllers one at a time and keeping the same domain data throughout the process, you don't need to back up/restore the AuthLite Data Manager data.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;There is not currently a way to export settings from the AuthLite Configuration tool, so make a note of your existing settings.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;On the new server:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Install AuthLite&lt;/li&gt;
&lt;li&gt;In the AuthLite Configuration app, go through each dialog and set proper values as you had in your old domain.&lt;/li&gt;
&lt;li&gt;If moving to a fresh domain, open the AuthLite Data Manager, and import the XML file from the old server via File-&amp;gt;Import Keys. This will restore all data that associates users and keys.&lt;/li&gt;
&lt;li&gt;IMPORTANT note for AuthLite version 1.x: If you had AuthLite Integrated users on the old domain, and you create new user accounts (even if they have the same names as the old accounts did), the AuthLite "integration" will not carry over to the new user accounts. Integrate them again on the new server via the change password screen. If this would be too much trouble, consider doing an in-place domain upgrade so that your user accounts will be migrated intact.&lt;/li&gt;
&lt;li&gt;After the upgrade, please REMOVE the backed up XML file, as it contains sensitive OTP data.&lt;/li&gt;
&lt;/ul&gt;</description>
      <a10:updated>2015-02-23T02:24:14Z</a10:updated>
    </item>
    <item>
      <guid isPermaLink="false">1602</guid>
      <link>http://azure.authlite.com/kb/authlite-upgrade-advisory-4</link>
      <title>AuthLite Upgrade Advisory #4</title>
      <description>&lt;h2&gt;Overview&lt;/h2&gt;
&lt;p&gt;On March 2, 2015, Collective Software corrected a design defect which allowed Windows workstations to cache 1-factor password hashes in some circumstances where 2-factor authentication was being used.  In the worst case, this means a session might be unlockable by entering only the password (instead of also requiring the OTP).&lt;/p&gt;
&lt;p&gt;To eliminate any potential for users logging on to workstations with 1-factor when they should be blocked, please check whether your configuration is affected, and deploy the new build.&lt;/p&gt;
&lt;h2&gt;Affected AuthLite Versions&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;AuthLite version 1.x: &lt;strong&gt;not affected&lt;/strong&gt;. You don't need to do anything, apart from make sure you have already updated for the older &lt;a href="http://www.collectivesoftware.com/_kb/authlite-upgrade-advisory-1"&gt; Advisory #1&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;AuthLite version 2.0.1-2.0.62: &lt;strong&gt;is affected&lt;/strong&gt;, please see below for update instructions. &lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;What Should I Do?&lt;/h2&gt;
&lt;p&gt;You can eliminate this issue by performing the following action:&lt;/p&gt;
&lt;h3&gt;Install an updated AuthLite version&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;Upgrade your workstations that have AuthLite installed, to AuthLite version 2.0.63 or later from &lt;a href="http://AuthLite.com"&gt; AuthLite.com&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;If your servers allow logon caching (via group policy "Interactive logon: Number of previous logons to cache") then you should also upgrade AuthLite on those systems.&lt;/li&gt;
&lt;li&gt;You must reboot the computers for the modification to become active.  Prior to rebooting, the systems will still be running the old version of the software in memory.&lt;/li&gt;
&lt;li&gt;Domain controllers are not affected by this issue because there is no offline logon caching on DCs.  It is OK to run a slightly older install on the DCs during your upgrade process, but you should plan to update them when convenient.&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;Common Questions and Answers&lt;/h2&gt;
&lt;h4&gt;What is my exposure? Could this issue allow outside users in to my systems?&lt;/h4&gt;
&lt;p&gt;An attacker who knows the password of a locked session might be able to unlock a presently locked session, thereby letting them impersonate the real user for the duration of the real user's kerberos ticket. &lt;/p&gt;
&lt;h4&gt;Should I upgrade from v1.x to version 2?&lt;/h4&gt;
&lt;p&gt;No, you do not need to do this.  Version 2 is a much more complex product and a proper upgrade requires a substantial amount of planning, configuration, and testing.  We offer &lt;a href="http://www.collectivesoftware.com/AuthLitePages/Store"&gt;professional services&lt;/a&gt; just to help with this.  In short, it's not something to be undertaken lightly. &lt;/p&gt;
&lt;h4&gt;Where do I have to install the update??&lt;/h4&gt;
&lt;p&gt;Install the updated software on all workstations that currently have AuthLite installed, and all non-Domain-Controller servers that currently have AuthLite installed, if those servers allow logon caching (which is the default configuration by Microsoft, see policy "Interactive logon: Number of previous logons to cache").&lt;/p&gt;
&lt;h4&gt;I need help with this, what should I do?&lt;/h4&gt;
&lt;p&gt;If you require further details, or assistance with installing the update, please open a Support Request from our &lt;a href="http://www.collectivesoftware.com/support/"&gt;Support page&lt;/a&gt; and reference Upgrade Advisory #4&lt;/p&gt;</description>
      <a10:updated>2015-03-02T23:27:23Z</a10:updated>
    </item>
    <item>
      <guid isPermaLink="false">1631</guid>
      <link>http://azure.authlite.com/kb/allow-runas-but-block-interactive-logon</link>
      <title>Allow RunAs but Block Interactive Logon</title>
      <description>&lt;h3&gt;Use case&lt;/h3&gt;
&lt;p&gt;Some customers want to use an administrator account only for "elevated" tasks, much like how unix systems support the concept of "sudo".  In addition, unix systems are commonly configured to block direct logon by administrator accounts.  The established procedure is to log on with an unprivileged user, and then elevate tasks with the "sudo" command where necessary.&lt;/p&gt;
&lt;p&gt;There is not an exact mapping of these concepts to the Windows environment.  Microsoft made some steps in this direction with User Account Control.  Also, the "run as" command allows a similar behavior pattern as the unix "sudo" (although not identical). &lt;/p&gt;
&lt;p&gt;Since many customers have best practices to avoid use of admin accounts wherever possible, let's explore whether we can allow an account to be used with the "run as" command, but block that account from logging in interactively to the desktop.&lt;/p&gt;
&lt;h3&gt;Internals&lt;/h3&gt;
&lt;p&gt;Authentications to the Windows desktop (whether via console or Remote desktop access) are known as "Interactive" logons.  Group policy allows us to restrict who can log on interactively, but this same policy &lt;em&gt;also&lt;/em&gt; controls use of the "run as" command.   (Windows uses the same logon type when you establish a secondary authentication, even though no additional desktop is shown.)  Thus, there's not any direct way (via policy) to restrict one, but not the other. &lt;/p&gt;
&lt;p&gt;Group policy &lt;em&gt;does&lt;/em&gt; allow a user account to have a different "shell" specified (the normal shell is "Explorer.exe").  We can use this feature to force an interactive session to log off immediately instead of displaying the Windows desktop.&lt;/p&gt;
&lt;h3&gt;Procedure&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;Create or select an Organizational Unit that will hold your logon-restricted users.&lt;/li&gt;
&lt;li&gt;Move users into the group (if necessary).&lt;/li&gt;
&lt;li&gt;Create a group policy object and apply to the OU&lt;/li&gt;
&lt;li&gt;Edit the group policy object.  Navigate to:
&lt;pre&gt;User Configuration &amp;gt; Policies &amp;gt; Administrative Templates &amp;gt; System&lt;/pre&gt;
and set the policy named "Custom User Interface" to "logoff.exe"&lt;/li&gt;
&lt;li&gt;Note that this policy will not apply immediately; you will need to use "gpupdate" on your systems if you intend to test right away.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Cautions&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;Use only true group policy for this setting.  Do &lt;em&gt;not&lt;/em&gt; apply this policy using the "Local" group policy object of specific machines, because it will then apply to &lt;em&gt;all&lt;/em&gt; users.  Effectively, no users will be able to log on to the machine (which is probably not what you want).&lt;/li&gt;
&lt;li&gt;If you apply this policy to domain admin user accounts, make sure to &lt;em&gt;also&lt;/em&gt; change the policy that allows only Administrators to authenticate to domain controllers.  Otherwise the only users allowed to log on to the DCs will immediately be logged off (which is probably not what you want).&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Limitations&lt;/h3&gt;
&lt;p&gt;The purpose of this procedure is &lt;strong&gt;only&lt;/strong&gt; to guide the behavior of legitimate users by preventing the inadvertent (or lazy) use of their elevated account for desktop sessions.  It does &lt;strong&gt;not&lt;/strong&gt; restrict what an attacker or malicious admin can do with their credentials.  Recall that authenticating to the interactive desktop is &lt;em&gt;not&lt;/em&gt; necessary in order to change any setting, &lt;em&gt;including&lt;/em&gt; changing their shell back to "explorer.exe".&lt;/p&gt;
&lt;p&gt;It is still important, therefore, to secure administrative users with 2-factor credentials.&lt;/p&gt;</description>
      <a10:updated>2015-04-13T21:54:54Z</a10:updated>
    </item>
    <item>
      <guid isPermaLink="false">1652</guid>
      <link>http://azure.authlite.com/kb/configuring-authlite-v2-for-vmware-vsphere</link>
      <title>Configuring AuthLite v2 for VMWare vSphere</title>
      <description>&lt;p&gt;Some issues with vSphere we need to address for AuthLite 2-factor enforcement:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;vSphere is not affected by logon group policies applied to its server, because it uses its own LDAP connection to authenticate to the DCs. &lt;/li&gt;
&lt;li&gt;It also does a static lookup of group membership over LDAP, so we cannot ask it to check for the AuthLite 2-factor Tag groups to do enforcement.&lt;/li&gt;
&lt;li&gt;Lastly, its LDAP authentication method requires some additional configuration in order for the DC to process it properly as a 2-factor logon.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Configuration for vSphere 2-factor logon enforcement:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Set up AuthLite users, placing them into the AuthLite users group, and assigning one or more tokens&lt;/li&gt;
&lt;li&gt;Enforce blocking 1-factor logon of AuthLite users to your vSphere servers, by adding the vSphere servers by name or IP to the Forced 2-factor Computers list in AuthLite.  This is the least favored way to enforce, but we have no other option because group policy is not relevant to vSphere.&lt;/li&gt;
&lt;li&gt;Make sure "Treat LDAP client IP as the authentication source" is selected.&lt;/li&gt;
&lt;li&gt;Add the vSphere servers to the "LDAP Permissions" list in AuthLite Configuration.  The default timeout of 5 seconds should be sufficient.&lt;/li&gt;
&lt;li&gt;Wait 20 minutes for all DCs to synchronize with the new AuthLite settings&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;To authenticate to the vSphere client as a 2-factor user, you must do the following:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Uncheck the "Use Windows session credentials" checkbox&lt;/li&gt;
&lt;li&gt;In the username field, enter the NETBIOS domain name and a backslash,&lt;/li&gt;
&lt;li&gt;If you are using a YubiKey, now press the button to fill in the OTP after the backslash.&lt;/li&gt;
&lt;li&gt;If you are using an OATH token, enter your username, followed by a dash, and then the current OATH OTP digits&lt;/li&gt;
&lt;li&gt;Enter your AD password as normal&lt;/li&gt;
&lt;li&gt;Click "Login"&lt;/li&gt;
&lt;/ul&gt;</description>
      <a10:updated>2015-06-24T19:09:29Z</a10:updated>
    </item>
    <item>
      <guid isPermaLink="false">1671</guid>
      <link>http://azure.authlite.com/kb/common-issues-with-oath-tokens-google-authenticator</link>
      <title>Common issues with OATH tokens (Google Authenticator)</title>
      <description>&lt;h4&gt;When you are first setting up AuthLite and having trouble with your OATH tokens:&lt;/h4&gt;
&lt;ul&gt;
&lt;li&gt;When provisioning a token, &lt;strong&gt;set the interval to 30 for Google Authenticator&lt;/strong&gt;.  You cannot make the token act differently by choosing a different number than 30, that's not what it does.  You will just make AuthLite mistakenly believe the token is running at a 60 second interval and all your OTPs will be wrong.&lt;/li&gt;
&lt;li&gt;Check the TIME is correct on all DCs and your phone or tablet. &lt;/li&gt;
&lt;li&gt;If you are using Google Authenticator on Android, go into Settings -&amp;gt; Time Correction for Codes -&amp;gt; Sync now.&lt;/li&gt;
&lt;li&gt;Check that the time ZONE is set properly on the DCs (it is not enough that the clock looks right, it must know its proper offset to GMT).&lt;/li&gt;
&lt;li&gt;Make sure "OATH digits" are set to "6" in the AuthLite Configuration app under the section "Token Settings".  The default is "0" which means do not use OATH tokens.  You &lt;strong&gt;cannot&lt;/strong&gt; make your soft tokens use a different number of digits by changing this value, that's not what it does.  You will just make AuthLite mistakenly believe the tokens use 8 digits when they do not.&lt;/li&gt;
&lt;/ul&gt;
&lt;h4&gt;If your old OATH token used to work, but then stopped working:&lt;/h4&gt;
&lt;ul&gt;
&lt;li&gt;The time probably drifted very slowly away from reality on your servers, and then was recently re-synchronized with reality.  As they drifted, the DCs did not know it was their fault.  They assumed the drift was because you are using tokens with poor clocks, so they kept track of the delta over time.  But then after the time fix on the servers, they now acts as if the tokens (who were right all along) have all suddenly reversed their accumulated drift.  So the DCs can't understand them any longer.  Make sure your servers' time is correct, and run &lt;a href="https://s3.authlite.com/downloads/ResetDrift.ps1"&gt;ResetDrift.ps1&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h4&gt;If your &lt;em&gt;old&lt;/em&gt; OATH tokens work fine but &lt;em&gt;new&lt;/em&gt; ones will not work:&lt;/h4&gt;
&lt;ul&gt;
&lt;li&gt;The time has gradually drifted away from reality on your servers and is now out of sync.  The DCs didn't know they were drifting.  They assumed the drift was because you are using tokens with poor clocks, so they kept kept track of the delta over time.  So your old tokens still work fine since the DCs are compensating for their own incorrectness (unknowingly).  The new tokens have an initial drift value of zero, and so the DCs cannot understand them.  Fix the time on your servers, then run &lt;a href="https://s3.authlite.com/downloads/ResetDrift.ps1"&gt;ResetDrift.ps1&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description>
      <a10:updated>2015-08-17T19:16:45Z</a10:updated>
    </item>
    <item>
      <guid isPermaLink="false">1683</guid>
      <link>http://azure.authlite.com/kb/stacking-credential-tiles</link>
      <title>Stacking Credential Tiles</title>
      <description>&lt;p&gt;Normally, AuthLite overrides and adds features to the default Microsoft credential tile presented on the Windows desktop. &lt;/p&gt;
&lt;p&gt;(AuthLite Features) -&amp;gt; (Default Tile)&lt;/p&gt;
&lt;p&gt;If you have another application that does the same thing, such as the password reset feature of Forefront Identity Manager (FIM)/Microsoft Identity Manager (MIM) then you will see "double" tiles on the login screen.  One tile will have the AuthLite functionality, and one will have the other application's functionality.&lt;/p&gt;
&lt;p&gt;(AuthLite Features) -&amp;gt; (Default Tile)&lt;/p&gt;
&lt;p&gt;(Other Application) -&amp;gt; (Default Tile)&lt;/p&gt;
&lt;p&gt;It is possible to consolidate these feature sets down into one tile by telling AuthLite the ID of the other vendor's credential provider.  Then AuthLite will override the functionality of the third party tile instead of the default one.&lt;/p&gt;
&lt;p&gt;(AuthLite Features) -&amp;gt; (Other Application) -&amp;gt; (Default Tile)&lt;/p&gt;
&lt;p&gt;To do this, you need to perform the following steps:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Discover the GUID of the other application's credential tile. &lt;/li&gt;
&lt;li&gt;Create a group policy object that tells AuthLite to override this credential provider, instead of the default one.&lt;/li&gt;
&lt;li&gt;Apply the group policy object to your workstations.&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;At the time of this writing, the FIM password reset GUID is: {3DD6481A-A712-4c4c-88FF-6DDCAB28DE86}  .  You can look in RegEdit at the&lt;/p&gt;
&lt;pre&gt;HKLM\Software\Microsoft\Windows\Current Version \ Authentication \ Credential Providers &lt;/pre&gt;
&lt;p&gt;section to see all the provider GUIDs.  In each sub-key you will see the name of the provider which may be enough of a clue to discern the right one.  Otherwise, contact the vendor of your other application.&lt;/p&gt;
&lt;p&gt;When authoring a group policy object, follow &lt;a href="https://technet.microsoft.com/en-us/library/Cc753092.aspx"&gt;these settings&lt;/a&gt; to create a registry value.  It should be a Computer setting (so hive = HKEY_LOCAL_MACHINE), and the Key Path should be:&lt;/p&gt;
&lt;pre&gt;Software\Policies\Collective Software\AuthLite&lt;/pre&gt;
&lt;p&gt;The Value name should be:&lt;/p&gt;
&lt;pre&gt; CredprovChain&lt;/pre&gt;
&lt;p&gt;and the Value data should be the GUID of the other application's credential provider that was discovered above.&lt;/p&gt;
&lt;p&gt;Ensure you link the group policy in a manner to affect the workstations and/or servers that have both AuthLite and the other application installed.  If the other application is not present, then this setting will break the AuthLite credential tile behavior on that host.&lt;/p&gt;
&lt;p&gt;You may need to restart a host to cause the credential tile to reset to the new behavior.&lt;/p&gt;</description>
      <a10:updated>2015-09-01T20:06:38Z</a10:updated>
    </item>
    <item>
      <guid isPermaLink="false">1685</guid>
      <link>http://azure.authlite.com/kb/authlite-installation-needed-on-all-domain-controllers</link>
      <title>AuthLite Installation Needed on All Domain Controllers</title>
      <description>&lt;h3&gt;Short answer:&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;YES.&lt;/strong&gt;&lt;/p&gt;
&lt;h3&gt;Medium answer:&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;YES&lt;/strong&gt;, unless you &lt;strong&gt;ONLY&lt;/strong&gt; need to use AuthLite for RADIUS authentication for a VPN, and you have installed NPS on DCs.  In that case, only the NPS DCs need AuthLite.  This is because NPS will always loop back to the domain services installed locally.&lt;/p&gt;
&lt;h3&gt;Longer answer:&lt;/h3&gt;
&lt;p&gt;You may consider authentication to be occurring on your workstation or your member servers, but in a domain environment all authentications ultimately involve a Domain Controller. &lt;/p&gt;
&lt;p&gt;AuthLite is not a client-only component that prevents logons after checking the OTP with some other authority.  Instead, it uses your Domain Controllers to validate the OTP as well as the password.  This is very important for "zero client" use cases.  AuthLite works by modifying the login request so that the Domain Controller sees the OTP in the username property.  Even if you use a client that allows you to enter the OTP in the password field, it gets internally rewritten to send the OTP in the username field.  This is because the password is never sent to the DC, only a hash (irrelevant exception: password changes)&lt;/p&gt;
&lt;p&gt;There is no API or method provided to restrict what DCs a client may reach.  Microsoft has a black-box protocol that makes clients favor the DCs in their local site.  Even so, if all nearby DCs are unresponsive, a client WILL reach out across site links.&lt;/p&gt;
&lt;p&gt;If a client reaches a DC that is not AuthLite aware, your 2-factor authentications will &lt;em&gt;fail&lt;/em&gt;, and 1-factor authentications that &lt;em&gt;should&lt;/em&gt; be blocked will be allowed.&lt;/p&gt;
&lt;h3&gt;But I still want to do it because (X)&lt;/h3&gt;
&lt;p&gt;If you want to avoid installing AuthLite on some DCs, the only secure approach is the following:&lt;/p&gt;
&lt;p&gt;You &lt;strong&gt;MUST&lt;/strong&gt; create firewall rules such that clients and member servers that participate in 2-factor authentication &lt;strong&gt;CANNOT REACH&lt;/strong&gt; any DCs that lack AuthLite awareness.  In other words, to these systems it should appear that every DC in your org is always down and unreachable, except for DCs that you've installed AuthLite on.&lt;/p&gt;</description>
      <a10:updated>2015-09-08T18:56:41Z</a10:updated>
    </item>
    <item>
      <guid isPermaLink="false">1706</guid>
      <link>http://azure.authlite.com/kb/permissions-to-import-yubikey-records</link>
      <title>Permissions to import YubiKey records</title>
      <description>&lt;h3&gt;Warning&lt;/h3&gt;
&lt;p&gt;First of all, please note that you &lt;strong&gt;SHOULD NOT&lt;/strong&gt; give help desk workers these permissions, because it entails allowing them to read and write OTP secrets. This is like letting them export everyone's AD password at will.&lt;/p&gt;
&lt;h3&gt;Opening the data partition&lt;/h3&gt;
&lt;p&gt;In ADSI Edit, open the AuthLite partition, which is under distinguished name:&lt;/p&gt;
&lt;pre&gt;DC=AuthLite,&amp;lt;DC=sandbox,DC=local&amp;gt;&lt;/pre&gt;
&lt;p&gt;NOTE: In the above command you must replace the &lt;strong&gt;&amp;lt;dc=sandbox,dc=local&amp;gt;&lt;/strong&gt;  portion with the LDAP syntax distinguished directory context of &lt;strong&gt;YOUR&lt;/strong&gt;  domain. (It will be the FQDN of your domain with "DC=" before each part, and a comma in place of each period.)&lt;/p&gt;
&lt;h3&gt;Full management permissions&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;Add the user or group to have &lt;em&gt;Full Control&lt;/em&gt; on the &lt;em&gt;CN=AuthLiteKeys&lt;/em&gt;  container&lt;/li&gt;
&lt;li&gt;Go into the Security-&amp;gt;Advanced view on the &lt;em&gt;CN=AuthLiteKeys&lt;/em&gt;  container, find the line representing the user or group you added above, and Edit that rule. Change the Applies section from &lt;em&gt;This object only&lt;/em&gt; to be &lt;em&gt;This object and all descendent objects&lt;/em&gt;&lt;/li&gt;
&lt;li&gt;Add the user or group to have Read access to the CN=AuthLiteHashes container&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt; &lt;/p&gt;</description>
      <a10:updated>2016-02-26T23:10:00Z</a10:updated>
    </item>
    <item>
      <guid isPermaLink="false">1707</guid>
      <link>http://azure.authlite.com/kb/make-rdp-client-stop-showing-old-otp</link>
      <title>Make RDP client stop showing old OTP</title>
      <description>&lt;h3&gt;Why is this a problem?&lt;/h3&gt;
&lt;p&gt;The remote desktop client, mstsc.exe, believes it is being helpful to you by showing the most recently used username in the login dialog.  For most normal users this would be true, but for AuthLite users it is annoying because the previously used OTP is not ever going to work.  The normal solution is to click "Other user" and enter a new OTP and password.&lt;/p&gt;
&lt;p&gt;There is not any setting or key you can change that will make the RD client stop trying to do this behavior, but there is an ugly workaround.&lt;/p&gt;
&lt;h3&gt;OK, how do we stop it?&lt;/h3&gt;
&lt;p&gt;I apologize in advance for the crudity of this method, but: go into the registry setting where mstsc stores its hints, and change the permission so it cannot write to the key.  In more detail, under the key&lt;/p&gt;
&lt;pre&gt;HKEY_CURRENT_USER\Software\Microsoft\Terminal Server Client\Servers\192.168.4.70&lt;/pre&gt;
&lt;p&gt;There will be a value called UsernameHint.  This stores what the client will display next time you try to connect to the server at "192.168.4.70".  Change the value from the old form&lt;/p&gt;
&lt;pre&gt;NETBIOSDOMAIN\old-otp-string&lt;/pre&gt;
&lt;p&gt;to simply:&lt;/p&gt;
&lt;pre&gt;NETBIOSDOMAIN\&lt;/pre&gt;
&lt;p&gt;After doing this, go into the Security tab of the server's key and DENY your own user the right to set values in the key.  See the following image:&lt;/p&gt;
&lt;p&gt;&lt;img src="http://s3.collectivesoftware.com.s3.amazonaws.com/images/2015-09-19%2013_41_58-Registry%20Editor.png" alt="" /&gt;&lt;/p&gt;
&lt;p&gt;After applying this setting, the logon window for this connection will always show a blank username field with the correct domain defaulted. &lt;/p&gt;
&lt;p&gt;If you want the benefit of having the domain pre-populated, then you have to make this change for every server sub-key.&lt;/p&gt;
&lt;p&gt;If you are OK with entering the domain name every time, you can deny access on the "Servers" key itself, and it will apply for every connection to every server then.&lt;/p&gt;</description>
      <a10:updated>2016-02-26T23:19:08Z</a10:updated>
    </item>
    <item>
      <guid isPermaLink="false">1708</guid>
      <link>http://azure.authlite.com/kb/authlite-upgrade-advisory-5</link>
      <title>AuthLite Upgrade Advisory #5</title>
      <description>&lt;h2&gt;Overview&lt;/h2&gt;
&lt;p&gt;On November 28, 2015, Collective Software corrected a settings defect introduced in AuthLite version 2.1.7 which caused a debugging feature to be enabled all the time, regardless of the user's intent.  This could cause servers to boot up with the AuthLite core disabled, which means that server would not be able to process 2-factor authentications in the manner the user expects.&lt;/p&gt;
&lt;p&gt;The feature in question is "Single shot crash dump", which attempted to collect debugging information in the event that lsass.exe (the authentication process) encountered an unhandled exception.  After such an exception, the AuthLite core on that system preemptively disables itself, so that during following reboots the system will start without AuthLite running.  (The theory behind this feature is that if lsass is crashing it would be safer to have the server running but AuthLite disabled, than have the server not able to boot.) &lt;/p&gt;
&lt;p&gt;This feature was intended to be disabled by default, and always optional to turn on.  But in versions 2.1.7-2.1.13, the feature is always active.  So it is therefore possible that a server could have crashed and the AuthLite core could have been subsequently disabled, without you necessarily knowing it.&lt;/p&gt;
&lt;p&gt;Instructions are included below on how to check and upgrade your installed version, as well as check that the AuthLite core is running properly. &lt;/p&gt;
&lt;h2&gt;Affected AuthLite Versions&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;AuthLite version 1.x and 2.0: &lt;strong&gt;not affected&lt;/strong&gt;.&lt;/li&gt;
&lt;li&gt;AuthLite version 2.1.0-2.1.6: &lt;strong&gt;not affected.&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;AuthLite version &lt;strong&gt;2.1.7-2.1.13&lt;/strong&gt;: &lt;strong&gt;is affected&lt;/strong&gt;, please see below for update instructions. &lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;What Should I Do?&lt;/h2&gt;
&lt;p&gt;You can eliminate this issue by &lt;strong&gt;performing the following actions on each system &lt;/strong&gt;where AuthLite is installed:&lt;/p&gt;
&lt;h3&gt;Install an updated AuthLite version on each system&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;Upgrade the software to 2.1.14 or later, from &lt;a href="http://AuthLite.com"&gt; AuthLite.com&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Make sure the AuthLite Core is enabled&lt;/h3&gt;
&lt;p&gt;When a system boots with the AuthLite core disabled, a Warning event with ID 1 (source AuthLite) with text "AuthLite Core is disabled!" is logged to the server's "AuthLite Security" event log, which is found under "Applications and Services Logs". &lt;/p&gt;
&lt;p&gt;Also, when the core is disabled on a system, the registry value HKEY_LOCAL_MACHINE\SOFTWARE\Collective Software\AuthLite\Settings "AuthLiteCoreEnabled" will be set to "false".  If this value does not exist or is set to "true", then the core is running on that machine.&lt;/p&gt;
&lt;p&gt;You only need to follow these steps if&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;you find the above event or registry setting on a server, or&lt;/li&gt;
&lt;li&gt;if AuthLite does not appear to be working properly on a server, or&lt;/li&gt;
&lt;li&gt;if your server restarted unexpectedly since installing 2.1.7-2.1.13.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Procedure to re-enable the AuthLite Core on a server through the registry:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Delete the value "AuthLiteCoreEnabled" under HKEY_LOCAL_MACHINE\SOFTWARE\Collective Software\AuthLite\Settings, or set it from "false" to "true"&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Restart this machine&lt;/strong&gt; to re-enable the AuthLite core.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Procedure to re-enable the AuthLite Core on a server through UI:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Open the AuthLite Configuration application and go to the Event Log section.&lt;/li&gt;
&lt;li&gt;Turn the slider up to Debug, so that the Advanced button becomes enabled&lt;/li&gt;
&lt;li&gt;In Advanced, make sure the "AuthLite Core is Enabled" checkbox is checked.&lt;/li&gt;
&lt;li&gt;If the core checkbox is &lt;strong&gt;not&lt;/strong&gt; checked, then you must select it, and click OK.&lt;/li&gt;
&lt;li&gt;Turn the slider back to Information, or whatever value you were using before.&lt;/li&gt;
&lt;li&gt;Click "Apply"&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Restart this machine&lt;/strong&gt; to re-enable the AuthLite core.&lt;/li&gt;
&lt;li&gt;Please note the "core enabled" checkbox &lt;strong&gt;only affects the machine you are currently on&lt;/strong&gt;.  Checking this box will only fix the current machine.  If other machines have experienced crashes, their AuthLite core may be (and remain) disabled until you perform this procedure on them.  So please &lt;strong&gt;check your other servers&lt;/strong&gt; too.&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;Common Questions and Answers&lt;/h2&gt;
&lt;h4&gt;What is my exposure?&lt;/h4&gt;
&lt;p&gt;Customers who enforce 2-factor using Group Policy are not at any risk.  The group replacement feature fails safe even if a domain controller or server is not running the AuthLite core.&lt;/p&gt;
&lt;p&gt;For other enforcement mechanisms: When servers don't load the AuthLite core, they cannot make correct decisions about 2-factor enforcement.  If you are using the "Forced 2-factor Computers" then you should check that the core is enabled on all your DC's.  If the core is disabled on a server, an authentication by an AuthLite user using just username and password would be allowed, even when it should have been blocked. &lt;/p&gt;
&lt;p&gt;If you are using the "Forced 2-factor Processes" list, then check that the core is enabled on all the servers which enforce 2-factor processes.  If the core is disabled on a server, an 1-factor session would be allowed even on a process that was designated to force 2-factor for AuthLite users.&lt;/p&gt;
&lt;h4&gt;Should I upgrade if I am not affected?&lt;/h4&gt;
&lt;p&gt;If you are on version 1.2, stay there unless you have consulted with our support staff.  Version 2 is a much more complex product and a proper upgrade requires a substantial amount of planning, configuration, and testing.  We offer &lt;a href="http://www.collectivesoftware.com/AuthLitePages/Store"&gt;professional services&lt;/a&gt; just to help with this.  In short, it's not something to be undertaken lightly. &lt;/p&gt;
&lt;p&gt;If you are on version 2.0, you may wish to move to the newest 2.0 build.  You can upgrade to version 2.1 at your discretion, but as of this article there are no compelling reasons to do so.  Be advised that version 2.1 has a new minimum .NET framework version of 4.0. &lt;/p&gt;
&lt;h4&gt;Where do I have to install the update??&lt;/h4&gt;
&lt;p&gt;Install the updated software on all systems that currently have AuthLite installed.  You must restart the system for the update to take effect.  If AuthLite does not appear to be working on a system, see the above section, "Make sure the AuthLite Core is enabled."&lt;/p&gt;
&lt;h4&gt;I need help with this, what should I do?&lt;/h4&gt;
&lt;p&gt;If you require further details, or assistance with installing the update, please open a Support Request from our &lt;a href="http://www.collectivesoftware.com/support/"&gt;Support page&lt;/a&gt; and reference Upgrade Advisory #5&lt;/p&gt;</description>
      <a10:updated>2016-02-26T23:21:36Z</a10:updated>
    </item>
    <item>
      <guid isPermaLink="false">1713</guid>
      <link>http://azure.authlite.com/kb/install-authlite-to-an-image-that-is-not-yet-domain-joined</link>
      <title>Install AuthLite to an image that is not yet domain-joined</title>
      <description>&lt;p&gt;As of version 2, AuthLite can only be installed and operate on domain-joined member machines.&lt;/p&gt;
&lt;p&gt;But if you are creating system images, the machine on which you are creating the image is not joined to a domain yet.&lt;/p&gt;
&lt;p&gt;Starting with v2.1.18, you can specify the MACHINETYPE property on the command line to cause the installer to assume the machine is domain-joined and install the proper components.&lt;/p&gt;
&lt;p&gt;Example:&lt;/p&gt;
&lt;pre&gt;AuthLite_installer_x64.msi MACHINETYPE=MemberWorkstation&lt;/pre&gt;
&lt;p&gt;Possible machine type values:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;pre&gt;MemberWorkstation&lt;/pre&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;pre&gt;MemberServer&lt;/pre&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;pre&gt;DomainController&lt;/pre&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Note that during a domain controller install, the installer normally installs any necessary schema updates and adds a data store replica to the DC.  This means if you are pre-staging an image that is not yet a domain controller, you should &lt;em&gt;also&lt;/em&gt; specify the options:&lt;/p&gt;
&lt;pre&gt;CREATESCHEMA=0 CREATEPARTITION=0 ADDLOCAL=DataManager&lt;/pre&gt;
&lt;p&gt;(Note that the last item prevents the installation of a replica. If ADDLOCAL contained the term "Replica" then it tries to create a replica)&lt;/p&gt;</description>
      <a10:updated>2016-03-24T00:41:48Z</a10:updated>
    </item>
    <item>
      <guid isPermaLink="false">1735</guid>
      <link>http://azure.authlite.com/kb/authlite-upgrade-advisory-6</link>
      <title>AuthLite Upgrade Advisory #6</title>
      <description>&lt;h2&gt;Overview&lt;/h2&gt;
&lt;p&gt;On September 26, 2016, AuthLite LLC corrected a defect introduced in AuthLite version 2.1.21 which caused AuthLite to be unable to read the command-line arguments of logon processes.  This could have affected the enforcement of the Forced 2-factor Processes list, and also anyone who relied on the built-in enforcement of the Network Policy Server plugin to block 1-factor AuthLite users.&lt;/p&gt;
&lt;p&gt;This issue is fixed in v2.1.24. Instructions are included below on how to check and upgrade your installed version.&lt;/p&gt;
&lt;h2&gt;Affected AuthLite Versions&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;AuthLite version 1.x and 2.0: &lt;strong&gt;not affected&lt;/strong&gt;.&lt;/li&gt;
&lt;li&gt;AuthLite version 2.1.0-2.1.20: &lt;strong&gt;not affected.&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;AuthLite version &lt;strong&gt;2.1.21-2.1.23&lt;/strong&gt;: &lt;strong&gt;is affected&lt;/strong&gt;, please see below for update instructions. &lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;What Should I Do?&lt;/h2&gt;
&lt;p&gt;You can eliminate this issue by &lt;strong&gt;performing the following actions on each system &lt;/strong&gt;where AuthLite is installed on an NPS server, or a system that has items defined in the "Forced 2-factor Processes" list:&lt;/p&gt;
&lt;h3&gt;Install an updated AuthLite version on each system&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;Upgrade the software to 2.1.24 or later, from &lt;a href="http://AuthLite.com"&gt; AuthLite.com&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Reboot the system to load the new version.&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;Common Questions and Answers&lt;/h2&gt;
&lt;h4&gt;What is my exposure?&lt;/h4&gt;
&lt;p&gt;If you run an affected version on a system that uses the Forced 2-factor Processes list, or the Network Policy Server plugin, AuthLite enforcement may not be working completely as you expect.  Please upgrade to the new version and then test your authentication use cases to ensure that 1-factor logins are blocked as you expect, and 2-factor logins work as you expect.&lt;/p&gt;
&lt;h4&gt;Should I upgrade if I am not affected?&lt;/h4&gt;
&lt;p&gt;&lt;strong&gt;If you are on version 1.2&lt;/strong&gt;, stay there unless you have consulted with our support staff.  Version 2 is a much more complex product and a proper upgrade requires a substantial amount of planning, configuration, and testing.  We offer &lt;a href="#" title="Store"&gt;professional services&lt;/a&gt; just to help with this.  In short, it's not something to be undertaken lightly. &lt;/p&gt;
&lt;p&gt;&lt;strong&gt;If you are on version 2.0&lt;/strong&gt;, you may wish to move to the newest 2.0 build.  You can upgrade to version 2.1 at your discretion, but as of this article there are no compelling reasons to do so.  Be advised that version 2.1 has a new minimum .NET framework version of 4.0. &lt;/p&gt;
&lt;h4&gt;Where do I have to install the update??&lt;/h4&gt;
&lt;p&gt;Install the updated software on all systems where AuthLite is installed on an NPS server, or a system that has items defined in the "Forced 2-factor Processes" list.&lt;/p&gt;
&lt;h4&gt;I need help with this, what should I do?&lt;/h4&gt;
&lt;p&gt;If you require further details, or assistance with installing the update, please open a Support Request from our &lt;a href="/support" title="Support"&gt;Support page&lt;/a&gt; and reference Upgrade Advisory #6&lt;/p&gt;</description>
      <a10:updated>2016-09-27T14:02:37Z</a10:updated>
    </item>
    <item>
      <guid isPermaLink="false">1736</guid>
      <link>http://azure.authlite.com/kb/configure-a-linux-domain-member-to-accept-authlite-otps</link>
      <title>Configure a Linux domain member to accept AuthLite OTPs</title>
      <description>&lt;p&gt;&lt;strong&gt;These legacy instructions are outdated&lt;/strong&gt;, preserved here for customers who are already using the pam_python method and need to refer to it.&lt;/p&gt;
&lt;p&gt;Please see the &lt;a href="/docs/2_4/id_1000016649/"&gt;Linux systems&lt;/a&gt; documentation page for the updated procedure.&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p&gt;(Outdated)&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;h2&gt;Debian-like systems&lt;/h2&gt;
&lt;h3&gt;Install packages and files&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;Install the &lt;strong&gt;pam_python&lt;/strong&gt; library.  On Debian-like systems:&lt;/li&gt;
&lt;/ul&gt;
&lt;pre style="padding-left: 30px;"&gt;sudo apt install libpam-python&lt;/pre&gt;
&lt;ul&gt;
&lt;li&gt;Copy the file &lt;a href="https://s3.authlite.com/downloads/pam/auth.py"&gt;auth.py&lt;/a&gt; to the directory &lt;strong&gt;/lib/security&lt;/strong&gt;.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Configure PAM&lt;/h3&gt;
&lt;p&gt;The PAM configuration needs to change so that the authentication calls pam_python.so before the Active Directory authentication. &lt;/p&gt;
&lt;p&gt;If the PAM configuration is managed by auth-update-pam, you can accomplish this via:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Copy the file &lt;a href="https://s3.authlite.com/downloads/pam/usr_share_pam-configs_authlite"&gt;authlite&lt;/a&gt; to the directory &lt;strong&gt;/usr/share/pam-configs&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;Run the command:&lt;/li&gt;
&lt;/ul&gt;
&lt;pre style="padding-left: 30px;"&gt;sudo pam-auth-update&lt;/pre&gt;
&lt;ul&gt;
&lt;li&gt;Now verify that the file &lt;strong&gt;/etc/pam.d/common-auth&lt;/strong&gt; has the line:&lt;/li&gt;
&lt;/ul&gt;
&lt;pre style="padding-left: 30px;"&gt;auth  optional  pam_python.so auth.py&lt;/pre&gt;
&lt;p style="padding-left: 30px;"&gt;above &lt;strong&gt;all&lt;/strong&gt; other "auth" lines.&lt;/p&gt;
&lt;p&gt;If the PAM configuration is managed manually: The goal is that whatever configuration file is being used for your authentication should have a line like:&lt;/p&gt;
&lt;pre style="padding-left: 30px;"&gt;auth  optional  pam_python.so auth.py&lt;/pre&gt;
&lt;p&gt;appear above all other "auth" lines.&lt;/p&gt;
&lt;p&gt;Now add:&lt;/p&gt;
&lt;pre style="padding-left: 30px;"&gt;try_first_pass&lt;/pre&gt;
&lt;p&gt;at the end of the auth line following (which may be pam_unix or pam_lsass depending on the system used for domain joining) if it is not already there.&lt;/p&gt;
&lt;p&gt;Next: see "Configure AuthLite" section below.&lt;/p&gt;
&lt;h2&gt;Redhat/CentOS-like systems&lt;/h2&gt;
&lt;h3&gt;Install pam_python files&lt;/h3&gt;
&lt;p&gt;There is no pre-packaged pam_python module for CentOS, so it must be built &lt;a href="https://sourceforge.net/projects/pam-python/files/"&gt;from source&lt;/a&gt; &lt;br /&gt;&lt;br /&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;tar -xzf the .tar.gz file and go into the src subfolder&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;In pam_python.c, move the #include for Python.h above the #include for pam_modules.h&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;"make pam_python.so".  &lt;br /&gt;&lt;br /&gt;Then copy pam_python.so and &lt;a href="https://s3.authlite.com/downloads/pam/auth.py"&gt;auth.py&lt;/a&gt; to /usr/lib64/security.  If it is a 32-bit machine it would be /usr/lib/security.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Configure PAM&lt;/h3&gt;
&lt;p&gt;The pam configuration will vary depending on how you have joined to the domain.  In our test lab using SSSD, we modified &lt;strong&gt;/etc/pam.d/password-auth&lt;/strong&gt; AND &lt;strong&gt;/etc/pam.d/system-auth&lt;/strong&gt; directly, adding:&lt;/p&gt;
&lt;pre style="padding-left: 30px;"&gt;auth   optional   pam_python.so /usr/lib64/security/auth.py &lt;/pre&gt;
&lt;p&gt;above the line for SSSD or Centrify.  Make sure you specify the correct full path to your auth.py script (lib or lib64 security).&lt;/p&gt;
&lt;p&gt;For SSSD, add "use_first_pass" to the pam_sss.so line, so it can see the password result from the pam_python module.&lt;/p&gt;
&lt;p&gt;For Centrify, add "try_first_pass" to the pam_centrifydc.so line.&lt;/p&gt;
&lt;h2&gt;Configure SSSD&lt;/h2&gt;
&lt;p&gt;If using SSSD, go into the sssd.conf file and add the "ad_server" setting, to specify an exact order for your DCs to be used. This counteracts aggressive load balancing that can cause the OTP to go to one DC but the password to another. Example:&lt;/p&gt;
&lt;pre&gt;ad_server = the.fqdn.of.server1,fqdn.server2,_srv_&lt;/pre&gt;
&lt;p&gt;(put _srv_ at the end, like that)&lt;/p&gt;
&lt;p&gt;Also set:&lt;/p&gt;
&lt;pre&gt;cache_credentials = False&lt;/pre&gt;
&lt;p&gt;After making any changes, bounce SSSD service and whatever logon system is affected by pam config updates (e.g. ssh)&lt;/p&gt;
&lt;h2&gt;Configure AuthLite&lt;/h2&gt;
&lt;p&gt;Add the linux &lt;strong&gt;computer account&lt;/strong&gt; (or a security group containing the computer account) to the following AuthLite settings:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Forced 2-Factor Computers (because linux generally can't see group policy enforcement)&lt;/li&gt;
&lt;li&gt;LDAP Permissions (because linux does an OTP lookup and then throws it away and sends the authentication request without the OTP)&lt;/li&gt;
&lt;li&gt;Sticky 2-Factor Computers (because SSSD does several authentications in a row without the OTP)&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;These settings will take 20 minutes to apply (plus time for inter-site replication, if applicable)&lt;/p&gt;
&lt;h3&gt;Test authentication&lt;/h3&gt;
&lt;p&gt;YubiKey: After entering your password, tap the YubiKey button to enter the OTP.  Wait for the green light to come back on, to see that the OTP is finished.  Then hit enter.&lt;/p&gt;
&lt;p&gt;OATH: After entering your password, enter a dash (-) and then the current OTP digits for this user.&lt;/p&gt;
&lt;h3&gt;Troubleshooting&lt;/h3&gt;
&lt;p&gt;Look at your system logs in /var/log. They will squawk if pam can't find the pam_python module, the auth.py script or other similar things.&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;</description>
      <a10:updated>2016-10-06T20:59:06Z</a10:updated>
    </item>
    <item>
      <guid isPermaLink="false">2079</guid>
      <link>http://azure.authlite.com/kb/rdp-bug-in-windows-10-builds-1709-and-1803</link>
      <title>RDP bug in Windows 10 (builds 1709 and 1803)</title>
      <description>&lt;h2&gt;Issue description&lt;/h2&gt;
&lt;p&gt;In the Fall 2017 "Creators Update" (build 1709) of Windows 10, Microsoft created a bug that affects how Remote Desktop credentials work.  If you use AuthLite with RDP and Windows 10 on either build 1709 or 1803, you may have to log in &lt;em&gt;twice&lt;/em&gt; to establish an RDP session.&lt;/p&gt;
&lt;p&gt;The first logon as you connect will work the same as always.  But then when the RDP desktop window opens, you may be presented with a second logon prompt.  (No error will be displayed, you just have to enter a fresh OTP and type your password again.)&lt;br&gt; &lt;br&gt; This problem will occur if your user account already has a session open on the machine (active or disconnected).  Conversely, if the user has no sessions logged on at the machine, the bug doesn't appear and everything will operate normally.&lt;/p&gt;
&lt;h2&gt;Cause&lt;/h2&gt;
&lt;p&gt;The RDP single sign-on functionality for all third-party credential providers has been affected by a bug added in Windows 10 build 1709.  It also affects build 1803 prior to the June 26, 2018 update.&lt;/p&gt;
&lt;h2&gt;Resolution&lt;/h2&gt;
&lt;p&gt;Installing Microsoft's &lt;a href="https://support.microsoft.com/en-us/help/4284848"&gt;June 26, 2018 cumulative update KB4284848&lt;/a&gt; resolves this issue for build 1803.&lt;/p&gt;
&lt;p&gt;At the time of writing (July 8, 2018) there is no fix for build 1709.&lt;/p&gt;
&lt;h2&gt;Similar Issues&lt;/h2&gt;
&lt;p&gt;If your system build does not match the above, and you receive an &lt;em&gt;error message&lt;/em&gt; after connecting to RDP, then you probably have a &lt;a href="/docs/2_3/id_1864787957/"&gt;Replay Window&lt;/a&gt; issue.&lt;/p&gt;
&lt;h2&gt;Getting help&lt;/h2&gt;
&lt;p&gt;If you have any questions about this issue, or are having other problems with AuthLite, we'll be happy to help.  Please visit our &lt;a href="/support" title="Support"&gt;support page&lt;/a&gt;.&lt;/p&gt;</description>
      <a10:updated>2018-07-08T17:16:25Z</a10:updated>
    </item>
    <item>
      <guid isPermaLink="false">5275</guid>
      <link>http://azure.authlite.com/kb/authlite-advisory-7-yubikey-fips-series-replacement</link>
      <title>AuthLite Advisory #7: YubiKey FIPS series replacement</title>
      <description>&lt;h2&gt;Overview&lt;/h2&gt;
&lt;p&gt;On June 13, 2019, &lt;a href="https://www.Yubico.com"&gt;Yubico&lt;/a&gt; (the manufacturer of YubiKey tokens used with AuthLite) released &lt;a href="https://www.yubico.com/support/security-advisories/ysa-2019-02/"&gt;security advisory YSA-2019-02 affecting the YubiKey FIPS token series&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;AuthLite does not directly use any of the affected features of the token, so your AuthLite deployment is not &lt;em&gt;directly&lt;/em&gt; affected.  However if you or your users use affected tokens for FIDO/U2F, smart-card, or OpenPGP, those other functions can be impacted.  Even tokens &lt;em&gt;not&lt;/em&gt; presently using those features might still use them in the future, so they are considered vulnerable.&lt;/p&gt;
&lt;h2&gt;Affected YubiKeys&lt;/h2&gt;
&lt;p&gt;YubiKey FIPS Series with firmware 4.4.2 to 4.4.4 inclusive:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;YubiKey FIPS firmware 4.4.2 to 4.4.4&lt;/li&gt;
&lt;li&gt;YubiKey Nano FIPS firmware 4.4.2 to 4.4.4&lt;/li&gt;
&lt;li&gt;YubiKey C FIPS firmware 4.4.2 to 4.4.4&lt;/li&gt;
&lt;li&gt;YubiKey C Nano FIPS firmware 4.4.2 to 4.4.4&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;*Not* Affected Tokens&lt;/h2&gt;
&lt;p&gt;All other YubiKeys.  I.e.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;YubiKey standard, versions 1-2&lt;/li&gt;
&lt;li&gt;YubiKey Edge&lt;/li&gt;
&lt;li&gt;YubiKey NEO&lt;/li&gt;
&lt;li&gt;YubiKey version 4,  standard and Nano, A and C&lt;/li&gt;
&lt;li&gt;YubiKey version 5, standard and Nano, A and C&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;What Should I Do?&lt;/h2&gt;
&lt;p&gt;Although there is no direct security threat to AuthLite use cases, if you have affected tokens purchased through AuthLite, you should still &lt;a href="/support" title="Support"&gt;contact support&lt;/a&gt; and obtain free replacement tokens.  We are also pro-actively reaching out to all customers who have purchased FIPS tokens from AuthLite.&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Obtain replacement tokens at no charge&lt;/li&gt;
&lt;li&gt;&lt;a href="/docs/2_3/id_953979801/"&gt;Program&lt;/a&gt; new AuthLite secrets onto the new tokens&lt;/li&gt;
&lt;li&gt;&lt;a href="/docs/2_3/id_268561548/"&gt;Import&lt;/a&gt; token XML file into the token manager.&lt;/li&gt;
&lt;li&gt;(Delete XML file after import! Very important!)&lt;/li&gt;
&lt;li&gt;Assign tokens to your users in the usual manner, either administratively, or using the &lt;a href="/docs/2_3/id_932530806/"&gt;self-service portal&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;Once users start using the new tokens, reclaim all the old tokens and &lt;strong&gt;discard them&lt;/strong&gt;. &lt;strong&gt;Do not&lt;/strong&gt; keep the tokens in reserve or keep using them for other purposes.  Their security should be considered compromised.&lt;/li&gt;
&lt;/ol&gt;
&lt;h2&gt;Common Questions and Answers&lt;/h2&gt;
&lt;h4&gt;Does this affect the security of Active Directory logons?&lt;/h4&gt;
&lt;p&gt;AuthLite does not directly use any of the affected features of the token, so your AuthLite deployment is not &lt;em&gt;directly&lt;/em&gt; affected.  However if you or your users ever use these tokens for FIDO/U2F, smart-card, or OpenPGP, those other functions can be impacted.&lt;/p&gt;
&lt;h4&gt;If I don't use affected protocols, can't I just ignore this?&lt;/h4&gt;
&lt;p&gt;Yubico has determined, in an abundance of caution, to replace &lt;em&gt;all&lt;/em&gt; affected devices, even if they are not currently using the affected protocols.  This is because we can never be certain that the tokens won't be reconfigured one day.  In particular: web sites often prompt users to add 2-factor security.  Users could choose to use FIDO/U2F with their YubiKeys even without telling the enterprise AD administrator. And those secondary uses of the token would be less secure.&lt;/p&gt;
&lt;h4&gt;I need help with this, what should I do?&lt;/h4&gt;
&lt;p&gt;If you require further details, or assistance with installing the update, please open a Support Request from our &lt;a href="/support" title="Support"&gt;Support page&lt;/a&gt; and reference Advisory #7 or FIPS token replacement.&lt;/p&gt;</description>
      <a10:updated>2021-02-28T15:21:53Z</a10:updated>
    </item>
    <item>
      <guid isPermaLink="false">5002</guid>
      <link>http://azure.authlite.com/kb/authlite-upgrade-advisory-8</link>
      <title>AuthLite Upgrade Advisory #8</title>
      <description>&lt;p&gt;September 10, 2019&lt;/p&gt;
&lt;p&gt;In the next upcoming Windows 10 (191X) release, Microsoft is changing an API function that AuthLite uses.  All old versions of AuthLite will fail to work properly on the new Windows 10 build, when it is released.&lt;br&gt;&lt;br&gt;This issue is fixed in v2.3.22, released September 10, 2019 and available from our site at &lt;a href="/downloads" title="Downloads"&gt;the downloads page&lt;/a&gt;.&lt;/p&gt;
&lt;h2&gt;Affected AuthLite Versions&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;AuthLite version 1.x and 2.0: &lt;strong&gt;not affected (&lt;/strong&gt;don't support Windows 10 anyway).&lt;/li&gt;
&lt;li&gt;AuthLite version 2.1.x, 2.2.x: &lt;strong&gt;are affected&lt;/strong&gt;, please upgrade DCs and Win10s to 2.3.22 or later&lt;/li&gt;
&lt;li&gt;AuthLite version 2.3.1-2.3.6: &lt;strong&gt;are affected&lt;/strong&gt;, please upgrade DCs and Win10s to 2.3.22 or later&lt;/li&gt;
&lt;li&gt;AuthLite version 2.3.1-2.3.21: &lt;strong&gt;are affected&lt;/strong&gt;, please upgrade Win10s to 2.3.22 or later&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;What Should I Do?&lt;/h2&gt;
&lt;h3&gt;If you run AuthLite 2.1 or 2.2:&lt;/h3&gt;
&lt;p&gt;It's time to upgrade your organization to version 2.3.  As long as your DCs are all running OS version 2008R2 or newer, you may migrate to 2.3 easily.  The first DC upgrade will require Schema Admins permission, and the subsequent DCs will only require Domain Admins rights.  DCs must restart after install, one at a time.&lt;br&gt;&lt;br&gt;After updating the DCs, you may update member machines.  For the purposes of this advisory, the only workstations that need to be updated are Windows 10 machines, so they will be ready for the next Microsoft 191X release.  Workstations must restart after upgrade.&lt;br&gt;&lt;br&gt;Other member machines may be updated or left as-is.&lt;/p&gt;
&lt;h3&gt;If you run AuthLite 2.3.1-2.3.6:&lt;/h3&gt;
&lt;p&gt;You must update all your DCs to a more modern 2.3.x build first, then Win10 workstations. DCs must restart after install, one at a time.&lt;br&gt;&lt;br&gt;After updating the DCs, you may update member machines.  For the purposes of this advisory, the only workstations that need to be updated are Windows 10 machines, so they will be ready for the next Microsoft 191X release.  Workstations must restart after upgrade.&lt;br&gt;&lt;br&gt;Other member machines may be updated or left as-is.&lt;/p&gt;
&lt;h3&gt;If you run AuthLite 2.3.7-2.3.21:&lt;/h3&gt;
&lt;p&gt;It is always best practice for DCs to be running a version newer or equal to all other systems.  But if necessary you may leave the older install on the DCs for now.  If you update, the DCs must restart after install, one at a time.&lt;br&gt;&lt;br&gt;For the purposes of this advisory, the only workstations that need to be updated are Windows 10 machines, so they will be ready for the next Microsoft 191X release.  Workstations must restart after upgrade.&lt;br&gt;&lt;br&gt;Other member machines may be updated or left as-is.&lt;/p&gt;
&lt;h3&gt;Questions or issues:&lt;/h3&gt;
&lt;p&gt;If you have any questions about the impact of this advisory, or the update instructions, or would like to schedule support time for assistance, please click the "(?)Tech Support Question/Create Support Ticket" button on &lt;a href="/support" title="Support"&gt;the support page&lt;/a&gt; and we will be happy to help.&lt;/p&gt;</description>
      <a10:updated>2021-02-28T15:20:39Z</a10:updated>
    </item>
    <item>
      <guid isPermaLink="false">4998</guid>
      <link>http://azure.authlite.com/kb/stop-rdp-client-from-remembering-last-username</link>
      <title>Stop RDP client from remembering last username</title>
      <description>&lt;h2&gt;Permanent&lt;/h2&gt;
&lt;p&gt;In a user's "Documents" folder there is a hidden file called "Default.rdp", which is used to store default preferences.&lt;/p&gt;
&lt;p&gt;If you open this in a notepad and add the value:&lt;/p&gt;
&lt;pre&gt;public mode:i:1
&lt;/pre&gt;
&lt;p&gt;Then that user's RDP client will no longer save credentials.&lt;/p&gt;
&lt;p&gt;&lt;em&gt;Sometimes&lt;/em&gt; previously saved values will still be used by the popup credential tile (which we consider to be a bug). To clear that out, find the affected server key(s) under regedit at&lt;/p&gt;
&lt;pre&gt;HKEY_CURRENT_USER\Software\Microsoft\Terminal Server Client\Servers&lt;/pre&gt;
&lt;p&gt;and delete their UsernameHint. (You can just delete the whole key if you want, though it will forget its RDP certificate fingerprints, if any, and make the user re-agree to the "do you want to trust this server" popups).&lt;/p&gt;
&lt;h2&gt;Temporary&lt;/h2&gt;
&lt;p&gt;You can also perform the "public mode" behavior in a one-off fashion by launching mstsc.exe with the argument "/public"&lt;/p&gt;</description>
      <a10:updated>2021-02-28T15:20:38Z</a10:updated>
    </item>
    <item>
      <guid isPermaLink="false">5214</guid>
      <link>http://azure.authlite.com/kb/authlite-upgrade-advisory-10</link>
      <title>AuthLite Upgrade Advisory #10</title>
      <description>&lt;p&gt;A bug introduced in version 2.3.26 can intermittently cause crashes at machine boot time.  Thanks to the assistance of an affected customer, we were able to find and correct it.&lt;/p&gt;
&lt;p&gt;Behavior: Normally if a crash occurs during boot, Windows recovers and boots successfully.  But if the crash happens several times in a row, the machine might show a Recovery screen or be stuck in a boot loop.  &lt;br&gt;&lt;br&gt;What to do:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;If you run any AuthLite software from &lt;strong&gt;2.3.26 to 2.3.30&lt;/strong&gt; inclusive, please &lt;strong&gt;update to 2.3.31 or later&lt;/strong&gt;. You can get the latest v2.3 Installer from the &lt;a href="/downloads" title="Downloads"&gt;downloads&lt;/a&gt; page&lt;/li&gt;
&lt;li&gt;If you run version 2.3.25 or older, this bug does not affect you.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;This does not constitute a security issue, however due to the chance of causing machine boot problems we are creating this upgrade advisory.&lt;br&gt;&lt;br&gt;If you have questions about this issue, please &lt;a href="https://tix.authlite.com"&gt;create a support ticket&lt;/a&gt;, and we will be happy to help.&lt;/p&gt;</description>
      <a10:updated>2021-02-28T15:21:33Z</a10:updated>
    </item>
    <item>
      <guid isPermaLink="false">5184</guid>
      <link>http://azure.authlite.com/kb/authlite-upgrade-advisory-9</link>
      <title>AuthLite Upgrade Advisory #9</title>
      <description>&lt;p&gt;There are some compatibility implications for AuthLite and Windows 10 version 2004:&lt;br&gt;&lt;br&gt;-   Due to an API change by Microsoft, Windows 10 version 2004 machines require AuthLite version 2.3.26 or newer to handle AuthLite User logons properly.&lt;br&gt;&lt;br&gt;-   Indirectly, this means your Domain Controllers should be updated to at least v2.3.26 or newer as well, so they can serve the new client machines correctly.  (AuthLite clients expect the servers' version to be at least as new as they are.)&lt;br&gt;&lt;br&gt;All AuthLite customers can update for free; we do not charge anything to install new versions.&lt;br&gt;&lt;br&gt;Update Procedure:&lt;br&gt;&lt;br&gt;1.  The newest version is always available at &lt;a href="/downloads" title="Downloads"&gt;AuthLite.com/downloads&lt;/a&gt;.  Get "v2.3 installer (Win64)" msi, or later&lt;br&gt;&lt;br&gt;2.  Update AuthLite on the DCs first, and restart (one at a time).  Note that you may need the Schema Admins group permission to update the first DC.&lt;br&gt;&lt;br&gt;3.  Then, you may push the new AuthLite version to client machines at your convenience.&lt;br&gt;&lt;br&gt;If you cannot update your DCs to version 2.3 yet (e.g. if you have any DC's that are older than Windows 2008R2) then please hold off on installing Win 10 version 2004 too.&lt;br&gt;&lt;br&gt;If you have Windows 10 machines that update to version 2004 but still have an older AuthLite that v2.3.26 on them, then AuthLite users will not be able to log in.  You can repair this problem by either:&lt;br&gt;&lt;br&gt;-   Updating the AuthLite version on the workstation and restarting.  Please make sure your DCs are also updated as soon as possible.&lt;br&gt;&lt;br&gt;-   OR temporarily pull users out of the AuthLite Users group, and have them log in with just passwords until the updates can be applied.  Then put the users back into the AuthLite Users group.&lt;br&gt;&lt;br&gt;If you have any questions or concerns about this, please open a support ticket at &lt;a href="/support" title="Support"&gt;AuthLite.com/support&lt;/a&gt; and we'll be happy to help.&lt;/p&gt;</description>
      <a10:updated>2021-02-28T15:21:24Z</a10:updated>
    </item>
    <item>
      <guid isPermaLink="false">5005</guid>
      <link>http://azure.authlite.com/kb/mapped-drive-file-share-troubleshooting</link>
      <title>Mapped Drive / File Share troubleshooting</title>
      <description>&lt;p&gt;The content of this KB entry has been moved to the following documentation page:&lt;/p&gt;
&lt;p&gt;&lt;a href="/docs/2_5/id_60775385" title="Mapped Drive / File Share Troubleshooting"&gt;Mapped Drive / File Share Troubleshooting&lt;/a&gt;&lt;/p&gt;</description>
      <a10:updated>2021-02-28T15:20:39Z</a10:updated>
    </item>
    <item>
      <guid isPermaLink="false">5199</guid>
      <link>http://azure.authlite.com/kb/authlite-security-advisory-11</link>
      <title>AuthLite Security Advisory #11</title>
      <description>&lt;h3&gt;Summary:&lt;/h3&gt;
&lt;ol&gt;
&lt;li&gt;If you are using &lt;strong&gt;pam_authlite&lt;/strong&gt; module version &lt;strong&gt;2.3.34.1&lt;/strong&gt; on Linux, please update immediately and &lt;a href="https://tix.authlite.com"&gt;contact us&lt;/a&gt; to mitigate a possible local information disclosure (more info below).  No other version is affected.&lt;/li&gt;
&lt;li&gt;If you are using our older Linux plugin that uses &lt;strong&gt;pam_python&lt;/strong&gt; and &lt;strong&gt;auth.py&lt;/strong&gt;, please update at your next convenience to the new supported system (more info below).&lt;/li&gt;
&lt;/ol&gt;
&lt;h3&gt;Issue #11.1 Information Disclosure:&lt;/h3&gt;
&lt;p&gt;There is an information disclosure bug in the Linux module &lt;strong&gt;pam_authlite&lt;/strong&gt; version &lt;strong&gt;2.3.34.1&lt;/strong&gt;.  As far as we know, there aren't any customers using this version (it contained a bug preventing it from working correctly and there were not any support requests logged about it).  However, this code version was available for download on our web site between December 27, 2020 and the end of January 2021, so we are notifying everyone just in case it was deployed anywhere. &lt;/p&gt;
&lt;p&gt;If you downloaded the file &lt;strong&gt;pam_authlite-2.3.34.1.tar.gz&lt;/strong&gt;, built, and installed it, then please open a support request at &lt;a href="https://tix.authlite.com"&gt;https://tix.authlite.com&lt;/a&gt;.  We will assist you to upgrade and mitigate a potential local information disclosure, where privileged information could be accessed by other users logged into the same machine.&lt;/p&gt;
&lt;h3&gt;Issue #11.2 pam_python Unsupported:&lt;/h3&gt;
&lt;p&gt;Prior to 2021, all our Linux plugin support for AuthLite used the third-party module "pam_python", which relies on a now unsupported version of Python, and does not look to be updated regularly any longer.&lt;/p&gt;
&lt;p&gt;Therefore, we have migrated away from this solution entirely, and made our own stand-alone module "pam_authlite" which does not rely on python or third party pam modules.  To update:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Debian-like&lt;/strong&gt;: Stop using the pam_python solution by removing the file "authlite" from the folder "/usr/share/pam-configs", and then running "sudo pam-auth-update".  Verify that "pam_python.so" lines no longer appear in any files in your /etc/pam.d folder.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Redhat/CentOS-like&lt;/strong&gt;: Stop using the pam_python solution by removing any "pam_python.so" lines from files in your /etc/pam.d folder.&lt;/li&gt;
&lt;li&gt;Follow instructions at &lt;a href="https://AuthLite.com/Linux"&gt;https://AuthLite.com/Linux&lt;/a&gt;  to build and install the new module.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p&gt;If you have questions about this advisory, please &lt;a href="https://tix.authlite.com"&gt;create a support ticket&lt;/a&gt;, and we will be happy to help.&lt;/p&gt;</description>
      <a10:updated>2021-02-28T15:21:29Z</a10:updated>
    </item>
    <item>
      <guid isPermaLink="false">8114</guid>
      <link>http://azure.authlite.com/kb/authlite-upgrade-advisory-12-server-2022</link>
      <title>AuthLite Upgrade Advisory #12 (Server 2022)</title>
      <description>&lt;p&gt;There are some compatibility implications for AuthLite and Windows Server 2022:&lt;br&gt;&lt;br&gt;-   Due to an API change by Microsoft, Windows Windows Server 2022 machines require AuthLite version 2.4.6 or newer. Installing an &lt;em&gt;older&lt;/em&gt; AuthLite version will make the lsass.exe process crash on boot, causing a restart of the system.&lt;br&gt;&lt;br&gt;-   Indirectly, this means your Domain Controllers should be updated to at least v2.4.6 or newer as well, so they can serve the new client machines correctly.  (AuthLite member servers and workstations expect the DC AuthLite version to be equal or newer.)&lt;br&gt;&lt;br&gt;All AuthLite customers can update for free; we do not charge anything to install new versions.&lt;br&gt;&lt;br&gt;Update Procedure:&lt;br&gt;&lt;br&gt;1.  The newest version is always available at &lt;a href="/downloads" title="Downloads"&gt;AuthLite.com/downloads&lt;/a&gt;.  Get "v2.4 installer (Win64)" msi, or later&lt;br&gt;&lt;br&gt;2.  Update AuthLite on the DCs first, and restart (one at a time).  Note that you may need the Schema Admins group permission to update the first DC.&lt;br&gt;&lt;br&gt;3.  Then, you may push the new AuthLite version to other non-DC machines at your convenience.&lt;br&gt;&lt;br&gt;If you cannot update your DCs to version 2.4.6 yet (e.g. if you have any DC's that are older than Windows 2008R2) then please hold off on installing Windows Server 2022 as well.&lt;br&gt;&lt;br&gt;If you have any questions or concerns about this, please open a support ticket at &lt;a href="/support" title="Support"&gt;AuthLite.com/support&lt;/a&gt; and we'll be happy to help.&lt;/p&gt;</description>
      <a10:updated>2021-10-24T18:15:19Z</a10:updated>
    </item>
    <item>
      <guid isPermaLink="false">8900</guid>
      <link>http://azure.authlite.com/kb/authlite-not-affected-by-log4jlog4shell-cves</link>
      <title>AuthLite NOT affected by Log4j/Log4Shell CVEs</title>
      <description>&lt;p&gt;No version of AuthLite is affected by any Log4j vulnerability, as no Java is used anywhere in the product.  No action is needed to mitigate &lt;a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44228" data-anchor="?name=CVE-2021-44228"&gt;CVE-2021-44228&lt;/a&gt; and &lt;a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45046" data-anchor="?name=CVE-2021-45046"&gt;CVE 2021-45046&lt;/a&gt;&lt;/p&gt;</description>
      <a10:updated>2021-12-16T16:31:35Z</a10:updated>
    </item>
    <item>
      <guid isPermaLink="false">9497</guid>
      <link>http://azure.authlite.com/kb/fortinet-sso-dc-agent-mode-and-authlite-break-each-other</link>
      <title>Fortinet SSO (DC Agent Mode) and AuthLite break each other</title>
      <description>&lt;p&gt;When Fortinet SSO Agent is installed on a DC and running in "DC Agent" mode instead of Polling mode, AuthLite is prevented from working. Whichever product was most recently installed (or repaired) will function, and the other will not.&lt;/p&gt;
&lt;p&gt;Windows provides only one "Auth0" registry hook under &lt;strong&gt;HKLM\System\CurrentControlSet\Control\Lsa&lt;/strong&gt; . AuthLite absolutely requires this to function, but Fortinet can be run in Polling mode instead.&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;Possible solutions&lt;/h3&gt;
&lt;h4&gt;Multiplexer&lt;/h4&gt;
&lt;p&gt;Install the &lt;a href="https://s3.authlite.com/downloads/2.5/LsaMultiplex_installer_x64.msi"&gt;LSA Multiplexer&lt;/a&gt; on every DC, and restart. This watches the Auth0 hook and makes sure it remains set to the multiplexer.&amp;nbsp; Then it calls dcagent (Fortinet) followed by AuthLite.&amp;nbsp; So both can work correctly.&lt;/p&gt;
&lt;p&gt;Or,&lt;/p&gt;
&lt;h4&gt;Switch to Polling Mode in Fortinet&lt;/h4&gt;
&lt;ul&gt;
&lt;li&gt;Remove DC Agent&lt;/li&gt;
&lt;li&gt;Uninstall AuthLite MSI on the DC (you can SKIP this reboot)&lt;/li&gt;
&lt;li&gt;Install AuthLite MSI again to set the hook properly&lt;/li&gt;
&lt;li&gt;Now reboot the DC&lt;/li&gt;
&lt;/ul&gt;</description>
      <a10:updated>2022-01-30T20:59:11Z</a10:updated>
    </item>
    <item>
      <guid isPermaLink="false">10923</guid>
      <link>http://azure.authlite.com/kb/avastavg-breaks-authlite-workaround</link>
      <title>Avast/AVG breaks AuthLite: workaround</title>
      <description>&lt;p&gt;As of late April 2022, the newest version of AVG/Avast anti-virus has a feature called "LSA Protection" that appears to block AuthLite from operating, as a side effect of its protection.&lt;br /&gt;&lt;br /&gt;This will cause problems on an increasing number of machines as the AV engines update over time.&lt;/p&gt;
&lt;p&gt;AVG has responded to several customers as of May 10th:&lt;/p&gt;
&lt;p style="padding-left: 40px;"&gt;Until we implement the controls of the LSA Protection in our policies, managed devices will need to perform the following to disable the feature:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Disable Self-Defense from the policy where the affected devices are assigned: Login into your Console &amp;gt; Polices &amp;gt; your Policy &amp;gt; General Settings &amp;gt; Troubleshooting &amp;gt; disable self defense &amp;gt; save.&lt;/li&gt;
&lt;li&gt;Then you will need to create a reg file or registry change via Group Policy/some management tools you may use, to apply it for all Devices on your Network:
&lt;pre&gt;Windows Registry Editor Version 5.00 &lt;/pre&gt;
&lt;pre&gt;[HKEY_LOCAL_MACHINE\SOFTWARE\AVAST Software\Avast\properties\settings\SelfDefense]&lt;/pre&gt;
&lt;pre&gt; "LsassProtection"="0" &lt;/pre&gt;
&lt;/li&gt;
&lt;li&gt;Once the registry change has been propagated to devices, re-enable Self-Defense.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;br /&gt;Also for individual machines, we have determined the following UI workaround to be successful:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;In Avast/AVG Menu -&amp;gt; Settings -&amp;gt; General -&amp;gt; Troubleshooting, disable "LSA Protection"&lt;/li&gt;
&lt;li&gt;Then reboot&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;We will continue to update this KB if we hear of new information that AVG releases to its customers.&lt;/p&gt;</description>
      <a10:updated>2022-05-05T20:36:06Z</a10:updated>
    </item>
    <item>
      <guid isPermaLink="false">11023</guid>
      <link>http://azure.authlite.com/kb/authlite-controlled-domain-admin-cant-log-into-exchange-admin-center</link>
      <title>AuthLite-controlled Domain Admin can't log into Exchange Admin Center</title>
      <description>&lt;ul&gt;
&lt;li&gt;Add the AuthLite DA group (AuthLite-protected Domain admins) to the &lt;strong&gt;Exchange Organization Admins&lt;/strong&gt; group (or &lt;strong&gt;Organization Management&lt;/strong&gt; )&lt;/li&gt;
&lt;li&gt;Remove the &lt;strong&gt;Exchange Organization Admins&lt;/strong&gt; group (or &lt;strong&gt;Organization Management&lt;/strong&gt; ) from Builtin\Administrators, as well as Domain/Enterprise Admins if it is in there&lt;/li&gt;
&lt;/ul&gt;</description>
      <a10:updated>2022-05-10T14:55:03Z</a10:updated>
    </item>
    <item>
      <guid isPermaLink="false">19701</guid>
      <link>http://azure.authlite.com/kb/authlite-upgrade-advisory-13-server-2012-r2</link>
      <title>AuthLite Upgrade Advisory #13 (Server 2012 R2)</title>
      <description>&lt;p&gt;&lt;br /&gt;&lt;br /&gt;Starting with the July 2023 Windows update on Server 2012 R2 Domain Controllers, AuthLite will accidentally break the thread pool when the server gets busy.  The server will start fine but then return authentication errors or become unresponsive once it hits a busy period of authentications.  The errors may initially involve only AuthLite users, but depending on the amount of load the entire operation of the DC can be affected.  It may not be able to recover until the server is restarted, but then the problems will recur when the server goes under busy authentication load again.&lt;br /&gt;&lt;br /&gt;Upgrading your DCs to the newest AuthLite version (2.4.11) and restarting them is sufficient to resolve this problem.  You can get this from the downloads page or directly at &lt;a href="https://s3.authlite.com/downloads/2.4/AuthLite_installer_x64.msi" class="moz-txt-link-freetext"&gt;https://s3.authlite.com/downloads/2.4/AuthLite_installer_x64.msi&lt;/a&gt; &lt;br /&gt;&lt;br /&gt;Notes:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;If you have 2012 R2 DCs, you should plan to upgrade them to 2.4.11 even if you have not noticed any problems yet.&lt;/li&gt;
&lt;li&gt;Make sure you have installed the relevant Microsoft Update to fix the GetAllTrustRelationships API. See the Microsoft support page at: &lt;a href="https://learn.microsoft.com/en-us/windows/release-health/status-windows-10-1809-and-windows-server-2019#apps-that-acquire-or-set-active-directory-forest-trust-information-might-have-issues" data-anchor="#apps-that-acquire-or-set-active-directory-forest-trust-information-might-have-issues"&gt;apps-that-acquire-or-set-active-directory-forest-trust-information-might-have-issues&lt;/a&gt;. Each OS version and .NET Framework version has a different relevant KB to download the update.&lt;/li&gt;
&lt;li&gt;If the AuthLite version on your DCs right now is *older than 2.3.27* then upgrading will require a schema update. We recommend you open a support request so we can advise about this, at &lt;a href="https://tix.authlite.com" class="moz-txt-link-freetext"&gt;https://tix.authlite.com&lt;/a&gt; .&lt;/li&gt;
&lt;li&gt;Even if you are not affected by this issue, you may always choose to upgrade your AuthLite version.  The issue described in this message, however, is only known to affect 2012 R2 DCs.&lt;/li&gt;
&lt;li&gt;You should maintain all DCs to be on the same AuthLite version as each other, however it is not critical to do this immediately in one batch. Please do not keep them on different versions perpetually however, as this can cause behavior to differ depending on which DC an authentication request reaches.&lt;/li&gt;
&lt;/ul&gt;</description>
      <a10:updated>2023-07-24T20:31:15Z</a10:updated>
    </item>
    <item>
      <guid isPermaLink="false">20701</guid>
      <link>http://azure.authlite.com/kb/authlite-advisory-14</link>
      <title>AuthLite Advisory 14 (2022 DCs *break* after 2023-10 Windows Update)</title>
      <description>&lt;p&gt;The "2023-10 Cumulative Update for Microsoft server operating system version 21H2 for x64-based Systems" (KB5031364) makes changes in the kdcsvc.dll file on 2022 Domain Controllers that cause previous versions of AuthLite to break and prevent the DC from booting or authenticating users.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Install &lt;a href="https://s3.authlite.com/downloads/2.4/AuthLite_installer_x64.exe"&gt;AuthLite 2.4.14&lt;/a&gt; or newer on your DCs to address this issue. &lt;/li&gt;
&lt;li&gt;Even though the issue only affects the 2022 DCs, it is generally preferable to update all DCs to eventually have them all running the same build.&lt;/li&gt;
&lt;li&gt;After installation, the DCs will not have problems with the 2023-10 update. &lt;/li&gt;
&lt;li&gt;For customers using AuthLite v2.5 please install 2.5.4 or newer, available from the Downloads page.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;If your DCs applied the update already and you can't log in, the simplest workaround is:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;mount the filesystem of the affected machine and rename the file c:\Windows\System32\CSALsubauth.dll to any other name (e.g. append an underscore).  &lt;/li&gt;
&lt;li&gt;After this, the AuthLite core will not load at next boot, and you should be able to boot and authenticate with your emergency break-glass account at least.  &lt;/li&gt;
&lt;li&gt;At that point you can install &lt;a href="https://s3.authlite.com/downloads/2.4/AuthLite_installer_x64.exe"&gt;version 2.4.14&lt;/a&gt; (or newer),&lt;/li&gt;
&lt;li&gt;and reboot, everything should work as before.&lt;/li&gt;
&lt;/ul&gt;</description>
      <a10:updated>2023-10-11T04:16:25Z</a10:updated>
    </item>
    <item>
      <guid isPermaLink="false">24185</guid>
      <link>http://azure.authlite.com/kb/authlite-advisory-15-june-2024-update-to-2019-and-2022-dcs</link>
      <title>AuthLite Advisory 15 (June 2024 update to 2019 and 2022 DCs)</title>
      <description>&lt;p&gt;2024-06 Cumulative Update has an accidental Microsoft bug that will make Domain Controllers stop calling the AuthLite module (thus breaking the authentication of all AuthLite Users.)&lt;/p&gt;
&lt;p&gt;Please install version 2.5.16 or later &lt;a href="/downloads" title="Downloads"&gt;from the downloads page&lt;/a&gt; to work around this problem.&lt;br&gt;&lt;br&gt;Affected OS:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Server 2022 domain controllers that have installed June 2024 (KB5039227) update &lt;strong&gt;or any later update&lt;/strong&gt; containing the same change. Microsoft updates are now &lt;em&gt;cumulative&lt;/em&gt; so you cannot simply block one update and avoid the problem.&lt;/li&gt;
&lt;li&gt;Server 2019 domain controllers that have installed June 2024 (KB5039217) update &lt;strong&gt;or any later update&lt;/strong&gt; containing the same change. Microsoft updates are now &lt;em&gt;cumulative&lt;/em&gt; so you cannot simply block one update and avoid the problem.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Not Affected:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Other OS version domain controllers&lt;/li&gt;
&lt;li&gt;Non-domain-controllers.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;If your DCs already updated, please log in with a 1-factor break-glass/emergency account to install the new AuthLite version, then reboot.&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;</description>
      <a10:updated>2024-06-12T13:38:20Z</a10:updated>
    </item>
    <item>
      <guid isPermaLink="false">25435</guid>
      <link>http://azure.authlite.com/kb/authlite-not-affected-by-yubico-cve-2024-45678</link>
      <title>AuthLite NOT affected by Yubico CVE-2024-45678</title>
      <description>&lt;p&gt;AuthLite is not affected by Yubico &lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2024-45678"&gt;CVE-2024-45678&lt;/a&gt; because AuthLite uses only the YubiOTP and HMAC/SHA1 C/R algorithms, which are not impacted in the CVE.&lt;/p&gt;
&lt;p&gt;The vulnerability requires physically destroying the key in order to access it with specialized equipment. If you use that YubiKey for other non-AuthLite purposes, such as FIDO, it could be vulnerable to that attack.&lt;/p&gt;
&lt;p&gt;If you have any questions please reach out to &lt;a href="/support" title="Support"&gt;Support&lt;/a&gt;.&lt;/p&gt;</description>
      <a10:updated>2024-09-04T17:39:52Z</a10:updated>
    </item>
    <item>
      <guid isPermaLink="false">26242</guid>
      <link>http://azure.authlite.com/kb/authlite-upgrade-advisory-16-for-server-2025-dcs</link>
      <title>AuthLite Upgrade Advisory #16 for Server 2025 DCs</title>
      <description>&lt;p&gt;In order to operate on Windows Server 2025 Domain Controllers, it will be necessary to run AuthLite 2.5.20 or newer. If you install an older version of AuthLite on Server 2025, or upgrade a server running an older AuthLite to 2025, it will go into a boot loop. If that happens, either remove the AuthLite install or rename C:\Windows\System32\CSALsubauth.dll to any other name (e.g. append an underscore).&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Recall that in general, DCs should be running the same or newer version compared to other domain member machines. It's a good idea to converge all DCs to the same build.&lt;/li&gt;
&lt;li&gt;It is permissible to run a newer version on your DCs than your domain members, and to have different members at different versions.&lt;/li&gt;
&lt;li&gt;To upgrade a server's AuthLite version you may simply install the newest version from the &lt;a href="/downloads" title="Downloads"&gt;Downloads&lt;/a&gt; page over the existing version, then reboot servers (one at a time).  All configuration and keys will be retained.&lt;/li&gt;
&lt;/ul&gt;</description>
      <a10:updated>2024-11-04T21:33:33Z</a10:updated>
    </item>
    <item>
      <guid isPermaLink="false">27065</guid>
      <link>http://azure.authlite.com/kb/settings-and-keys-lost-when-installing-on-a-new-dc-fixing-and-preventing</link>
      <title>Settings and keys lost when installing on a new DC, fixing and Preventing</title>
      <description>&lt;p&gt;&lt;strong&gt;Note: AuthLite version 2.5.23 and newer have been modified to prevent these issues from arising.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;When AuthLite is already running on your network and then you install AuthLite 2.5.22 or earlier on the &lt;strong&gt;first DC in a new site&lt;/strong&gt;, there is a chance it can accidentally create extra copies of the AuthLite data partition containers instead of seeing the old ones. &lt;/p&gt;
&lt;p&gt;These extras will replicate (after up to three replication cycles, sometimes taking 2-3 hours depending on your topology) and cause a naming conflict, and the directory will then rename the old (real) containers, accidentally &lt;strong&gt;hiding&lt;/strong&gt; the real data and making everything seem broken.&lt;/p&gt;
&lt;h2&gt;If settings are already lost&lt;/h2&gt;
&lt;p&gt;If this has happened to you, log in with a break-glass DA account, and run &lt;a href="https://s3.authlite.com/Debug/FixConflicts.ps1"&gt;FixConflicts.ps1&lt;/a&gt; on a DC (just one, it should not matter which).  See if it finds and restores any settings. After the replication has completed again between sites, everything should be restored to a working condition.&lt;/p&gt;
&lt;p&gt;(Don't forget to re-set your break-glass DA account with a fresh random long password once you're done using it, and record the new value for an emergency.)&lt;/p&gt;
&lt;h2&gt;To prevent naming conflicts at install time&lt;/h2&gt;
&lt;p&gt;We are working on a new version of the installer that will try to detect and prevent this case from happening, but it's challenging to proactively detect.  Prior to AuthLite 2.5.23, the best procedure to prevent is the following:&lt;/p&gt;
&lt;p&gt;When installing AuthLite on new DCs, you can call it from the command line with additional argument CREATEPARTITION=0 .  For example&lt;/p&gt;
&lt;pre style="padding-left: 40px;"&gt;AuthLite_installer_x64.exe  CREATEPARTITION=0&lt;/pre&gt;
&lt;p&gt;Note if this is &lt;strong&gt;the very first install of AuthLite on a DC&lt;/strong&gt; you must let the partition create; do not run it with createpartition=0 , or there will be nowhere to store settings.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;AuthLite version 2.5.23 and newer have been modified to prevent these issues from arising.&lt;/strong&gt;&lt;/p&gt;</description>
      <a10:updated>2025-01-15T19:41:42Z</a10:updated>
    </item>
    <item>
      <guid isPermaLink="false">30204</guid>
      <link>http://azure.authlite.com/kb/authlite-upgrade-advisory-17-november-2025-update-breaks-some-2025-dcs</link>
      <title>AuthLite Upgrade Advisory #17 (November 2025 Update breaks some 2025 DCs)</title>
      <description>&lt;p&gt;After the November 2025 Windows Update, if Windows Server 2025 Domain Controllers are running "Additional LSA Protection" they may stop being able to track the correct IP address for LDAP connections. This can lead to failure to permit 2FA logons and/or &lt;strong&gt;failure to enforce 2FA on LDAP clients&lt;/strong&gt; because it doesn't see the traffic as being from an enforced IP.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Upgrade to AuthLite 2.5.29 or newer to correct this issue; a reboot is required.&lt;/li&gt;
&lt;li&gt;You &lt;strong&gt;do not &lt;/strong&gt;need to disable LSA protection, it is a security feature that you should retain. Some bad AI advice will direct you to disable it, due to the fact that AuthLite didn't support it many years ago.&lt;/li&gt;
&lt;li&gt;As far as we can determine, this issue &lt;strong&gt;does not&lt;/strong&gt; affect other DCs, but you can upgrade them, and in general DCs should be converged to run the same build whenever possible.&lt;/li&gt;
&lt;li&gt;This issue &lt;strong&gt;does not&lt;/strong&gt; affect member servers or workstations, but it is fine to upgrade them too. &amp;nbsp;It is also OK to leave them on older builds.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;General advice:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Recall that in general, DCs should be running the same or newer version compared to other domain member machines. It's a good idea to converge all DCs to the same build.&lt;/li&gt;
&lt;li&gt;It is permissible to run a newer version on your DCs than your domain members, and to have different members at different versions.&lt;/li&gt;
&lt;li&gt;To upgrade a server's AuthLite version you may simply install the newest version from the &lt;a href="/downloads" title="Downloads"&gt;Downloads&lt;/a&gt; page over the existing version, then reboot servers (one at a time).&amp;nbsp; All configuration and keys will be retained.&lt;/li&gt;
&lt;/ul&gt;</description>
      <a10:updated>2025-12-03T15:32:11Z</a10:updated>
    </item>
  </channel>
</rss>