Modules
Sign in
Get Help

Adding a Windows Logon Agent

Windows Logon agent

Offers companies the ability to add two-factor authentication to Microsoft’s Windows client and server operating systems. It provides a simple logging in experience irrespective of whether the user logs into a local desktop or through a terminal session. It offers identity assurance by requiring users to provide their Passly 2FA passcode during the log-on process. 

Supported Operating Systems 

  • Windows 10 
  • Windows 11
  • Server 2016 
  • Server 2019 

  • Server 2022

Notes:  

  • This agent is installed on a per machine basis.  

  • This agent requires that the Passly username and the Windows username should match. 

  • This agent does not support any x86 versions of Windows.

  • This agent does not support logins using U2F YubiKeys.

The Passly Windows Logon Agent has some unique policies that can be enabled. This article contains some working examples that will help you with your agents.
Note: For help deploying a Windows Logon agent please see this article

Terminology

Winlogon performs a variety of critical tasks related to the Windows sign-in process. For example, when you sign in, the winlogon.exe process is responsible for loading your user profile into the registry. Winlogon.exe has special hooks into the system and watches to see if you press Ctrl+Alt+Delete.

LogonUI - logonui.exe installs a process that is associated with Winlogon application. The file initiates the application’s User Interface and the process is known as Windows Logon UI. This is what you see when you are asked by the system to logon to your User Account before system files can be loaded with startup. 

The Windows credential provider framework enables developers to create custom credential providers. When Winlogon wants to collect credentials, the Logon UI queries each credential provider for the number of credentials that it wishes to enumerate. After all providers have enumerated their tiles, the Logon UI displays them to the user. The user then interacts with a tile to supply the necessary credentials. The Logon UI submits these credentials for authentication.

Thanks to this system, it is much easier to create a credential provider than it was historically. Much of the work is handled by the combination of Winlogon, the Logon UI and the Credential UI.

Credential providers are registered on a Windows machine and are responsible for the following:

  • Describing the credential information required for authentication.

  • Handling the communication and logic with any external authentication authorities.

  • Packaging the credentials for interactive and network logon.

Prerequisite Software  

To configure a Windows Logon agent please follow these steps

First create a Policy for this agent.

  1. Log into your tenant https://(your company).my.Passly.com
  2. Select Policy Manager.
  3. Select the Add icon (small green + sign in the bottom right corner). 
    blue.PNG
  4. Name the Policy
    Example: Windows Logon Agent.
    Set your Policy Elements & Actions.
    Note: This policy must not allow for simple passwords. Require 2FA must be used.
    Capture.PNG
  5. When you have your policy completed select Save changes.
    policynew2.png

Creating the Windows Logon Agent

  1. Select Auth Manager.
  2. Select the Add icon (small green + sign in the bottom right corner). 
    blue.PNG
  3. Mouse over the add icon to launch the selector. Select Add New Agent.
    mceclip0.png
  4. Select Windows Logon.
    mceclip0.png
  5. Configure the agent.
    Select Agent is enabled.
    Select the policy you created in Step 4.
  6. Select Windows Logon Configuration.
    mceclip0.png
    Note: 'Enforce 2FA on RDP Only' is not supported on versions of Windows earlier than Windows 8 and Windows Server 2012.
    Note: It is recommend that you set an Override Password for all installs.
    Note: You will need to manually create the Passly Override Group. mceclip0.pngmceclip1.png
    Domain Joined Machines. You will need to create an Active Directory Security group called "PasslyOverrideGroup".
    Stand-alone Windows machines. You will need to create a local Security group called "PasslyOverrideGroup" on the specific machine.
    Note: Enabling "Allow Offline Access" will allow the admit to setup the ability for the user to login with no internet connection. This setting must be enabled, as well the user needs to login once before the machine is taken offline. The maximum number of days is an arbitrary decision made by the admin deploying the agent.
    mceclip1.png
    Note: Offline access requires the user to login at least once with an internet connection to validate the first PUSH. From that point on the user can use OTP offline.
    This only works with the Passly iOS & Android Authenticator apps. 
    Note:  There is an option here to upload an an image file. This would be the icon for the Windows agent that is scene in the Auth Manager > Agents/Clients UI. Customers are not required to change this image.
    Capture2.PNG

  7. Select Add Agent.
    3.PNG
  8. Select the Agent from the agent list in Auth Manager.
  9. Select Download Installer.
    4.PNG
  10. Copy the installer AAWinLogonCP.msi file to the target x64 Windows Server/Desktop/Workstation.
    Note: The installer must be on the local machine and not run from a shared drive like Lancache.
  11. Run the MSI AAWinLogonCP.msi
    Note: If installing on a DC or where there might be excessive UAC style controls enabled you can run the MSI from an elevated command.
  12. Select Run if prompted.
    5.PNG
  13. Select Next.
    6.PNG
  14. Accept the Terms of Use. Select Next.
    7.PNG

  15. Logon Agent configuration. Set the following.
    Home Realm: (This your tenant (your company).my.Passly.com)
    Note: Remove the HTTPS:// from the URL before entering the homerealm.
    Note: If you are installing a Sub-Organisation's agent you will need to use the sub-Org URL,
    For example my tenant is kaseya.my.passly.com and client org is acme. I use acme-kaseya.passly.com for my Acme agent Home Realm. 
    ID: (This will be provided on the agent information screen where you downloaded the agent).
    Key: (This will be provided on the agent information screen where you downloaded the agent).

    8.PNG
  16. Select Next.
  17. Select Install.
    9.PNG
  18. Select Finish.
    10.PNG

 

Test the agent

  1. Lock the desktop. Enter the user's Windows Password.
  2. You should receive a Push notification automatically.
    Note: PUSH is only possible if the machine has an active internet connection. 
    Note: If the PUSH fails you will receive an 2FA prompt for the passcode. Open the Authenticator app. Tap your username. This will provide you with your one time password.

Windows Logon Agent Advanced Policies

We have published this article to help with more advanced settings for the Policy Manager. 

Have more questions?

Contact us

Was this article helpful?
0 out of 0 found this helpful

Provide feedback for the Documentation team!

Browse this section