VIP Quick Start Guide: Windows Server Authentication with Microsoft Credential Provider (MCP)
VIP Integrations
Symantec VIP Integration Guide for Microsoft Credential Provider
Symantec’s VIP authentication offers multi-factor authentication to a variety of applications including the Windows logon screen for Windows servers and other fixed Windows systems. Whether logging on directly at the console or across the network via Remote Desktop, Symantec VIP can secure session access with multi-factor authentication.
Symantec’s integration flexibly offers security for a variety of situations: for all users, for those with credentials, for those in a particular group, and more. This quick start guide summarizes the options available to you.
The Symantec VIP plugin for Microsoft Credential Provider was designed to protect your internal resources.
Below is a typical architecture:
The Windows system needs to be able to contact VIP Enterprise Gateway across the local network. From there, communication to Active Directory is required for some configurations. For all configurations, VIP Enterprise Gateway must be able to contact the Symantec VIP service.
The Symantec VIP plugin for Microsoft Credential Provider utilizes three parameters to control different levels of protection.
These are:
Together, these can describe multiple protection levels, five of which are outlined below:
The above five protection levels will be described in this quick start guide, though other combinations are possible.
The below configuration descriptions rely upon an initial installation and configuration on the target server and then a subsequent modification of the Windows Registry to customize the configuration.
For full details around each setting and general deployment considerations, see the Symantec VIP Integration Guide for Microsoft Credential Provider for details.
The Symantec VIP plugin for Microsoft Credential Provider supports a PUSH login experience when logging in to the target server. In order for the plugin to work correctly, it needs to wait an appropriate amount of time for the PUSH request to reach the user and then for the user to take action. This change is made in two places: the target server’s Time Out registry setting and VIP Enterprise Gateway’s validation server Timeout configuration. The initial suggested value for PUSH timers is 60 seconds – these are depicted below.
Note that CPConfig.txt can also be used to set these values at initial installation on the target server.
Target server’s registry:
VIP Enterprise Gateway’s Validation Server:
VIP Manager showing the PUSH feature enabled:
DANGER: It is possible to lock yourself out of a server using this method!
For this configuration, each target server must have the registry key ChallengeLocalUser set to 1, as in:
HKLM\Software\Symantec\CP\Options\ChallengeLocalUser
If the associated VIP Enterprise Gateway validation server also checks for users against Active Directory, then the following Enterprise Gateway flag must be additionally set (in radserver.conf):
skipLocalUsersForUserStoreSearch
This value is normally set to “False” and must be changed to “True”.
radserver.conf is typically located here on VIP Enterprise Gateway running on Windows:
C:\Program Files (x86)\Symantec\VIP_Enterprise_Gateway\Validation\servers\myValServer\conf\radserver.conf
See the “Local User Authentication with Symantec VIP Credential Provider” in the Symantec VIP Integration Guide for Microsoft Credential Provider.
In this configuration, it may be beneficial to configure some local users in the “no2fa” local group in order to continue to allow access to this server. Without this, in a lockout scenario remotely editing the registry of this server or performing local maintenance in order to remove or modify that registry value would be required.
No special configuration is needed. The default values are listed below, for reference:
“no2fa” does not exist or is empty (either as a local group or an Active Directory group)
Registry: HKLM\SOFTWARE\Symantec\CP:
LoginDomainFieldId (DWORD): 9
Retries (String): 5
Time Out (String): 10
Validation Server (String): VIP-EG-IP:PORT:camouflaged_secret
Registry: HKLM\SOFTWARE\Symantec\CP\Options:
AllowedCP (String): {GUID.EN_US}:{GUID.EN_US}
ChallengeLocalUsers (String): 0
EnablePartial2FA (String): 0
RDPShowConsole (String): 0
Strip Domain (String): 1
VIP Enterprise Gateway setting: skipLocalUsersForUserStoreSearch: false
radserver.conf is typically located here on VIP Enterprise Gateway running on Windows:
C:\Program Files (x86)\Symantec\VIP_Enterprise_Gateway\Validation\servers\myValServer\conf\radserver.conf
For this configuration, create a no2fa group within Active Directory the VIP Enterprise Gateway user store is pointing to. Members of this group will bypass Symantec VIP to log onto all protected server(s). Optionally, a no2fa group can be added to individual servers. In either case, changes made to no2FA group membership will instantly affect logon behavior instantly. In the case of an Active Directory no2fa group, this presumes that the particular domain controller queries have received appropriate synchronization.
...
For this configuration, each target server must have a registry key added called “EnablePartial2FA”. It is added at this location in the Windows Registry:
HKLM\Software\Symantec\CP\Options\EnablePartial2FA
EnablePartial2FA is of type String with a value of 1
In this configuration, a user without a VIP credential will not be prompted for two factor authentication: username and password will be sufficient to login (provided that user has permission to logon to this server).
For this configuration, add an “EnablePartial2FA” registry key to each protected server:
HKLM\Software\Symantec\CP\Options\EnablePartial2FA
EnablePartial2FA is of type String with a value of 2
Additionally, configure the VIP Enterprise Gateway’s User Store and Validation Server.
Example VIP Enterprise Gateway Validation Server configuration:
The User Store must select the users that require 2FA. For more granular protection, restrict logon to the target server:
1) Only the select users may log onto that server (per the user store filter), and
2) these users require 2FA in order to log on.
3) Any exceptions to this are carefully documented and secured.
Microsoft Credential Provider is utilized during local login, remote desktop login, and unlocking an existing session. Microsoft Credential Provider is not utilized for remote file share access, permissions escalation in Windows, or authenticating via Integrated Windows Authentication (IWA), so VIP cannot secure those resources.
The Credential Provider architecture offers a flexible and extensible method to add authentication to Windows. Some systems make use of other Credential Provider plugins and it is necessary for VIP to interwork with them properly – especially in technology transition scenarios. The Integration Guide for Microsoft Credential Provider covers interworking alongside other plugins in a section title “Allowing Third-party Credential Providers along-with Symantec Credential Provider” in the Symantec VIP Integration Guide for Microsoft Credential Provider guide.
The Symantec VIP plugin for Microsoft Credential Provider has a number of settings that need to be coordinated on the target server in concert with Windows permissions, the VIP Enterprise Gateway, and more. Occasionally, issues may surface while initially working on this integration. This section offers some general reminders only.
Additional Resources and Guides:
Symantec VIP Tech Docs