Skip to content

Commit

Permalink
Merge pull request #1159 from GSA/0930-SCauth-Updates
Browse files Browse the repository at this point in the history
0930 sc auth updates
  • Loading branch information
JBPayne007 authored Oct 8, 2024
2 parents 192284b + ef71ab5 commit 341a2c6
Showing 1 changed file with 1 addition and 1 deletion.
2 changes: 1 addition & 1 deletion _implement/scl-windows.md
Original file line number Diff line number Diff line change
Expand Up @@ -35,7 +35,7 @@ subnav:
<div class="usa-alert__body">
<h4 class="usa-alert__heading">September 2024 - Update to Microsoft Network Authentication Issue</h4>
<p class="usa-alert__text">
As of September 10th 2024, Microsoft has released a solution for Active Directory network authentication issues resulting from the May 2022 patches that impacted some PIV network authentications. The September patch applies to Windows Server 2019 and later and includes a mechanism for support of some deprecated identifiers asserted by PIV authentication certificates (e.g., UPN or X509IssuerSubject altsecid) and mapped to AD user accounts. AD administrators now have the ability to add registry keys that include what is being termed a "Triple Mapping" or "Policy Tuple" that allows the domain controller to determine if an authentication certificate is issued from a trusted Certification Authority (CA) and if it asserts an acceptable policy OID before defining acceptable identifiers for user account mapping. You can read more about these AD changes in the following <a class="usa-link usa-link--external" href="https://techcommunity.microsoft.com/t5/public-sector-blog/enable-strong-name-based-mapping-in-government-scenarios/ba-p/4240402" target="_blank" rel="noopener noreferrer">Microsoft Public Sector Blog</a>. Full enforcement mode for use of approved identifiers is still planned to go into effect on February 11, 2025 and compatibility mode will be fully retired on September 10th, 2025. See Step 4 below regarding Account Linking for further details.
As of September 10th 2024, Microsoft has released a solution for Active Directory network authentication issues resulting from the May 2022 patches that impacted some PIV network authentications. The September feature preview applies to Windows Server 2019 and later and includes a mechanism for support of some deprecated identifiers asserted by PIV authentication certificates (e.g., UPN or X509IssuerSubject altsecid) and mapped to AD user accounts. Once the September feature preview is installed and the servers are restarted, AD administrators will have the ability to add registry keys that include what is being termed a "Triple Mapping" or "Policy Tuple" that allows the domain controller to determine if an authentication certificate is issued from a trusted Certification Authority (CA) and if it asserts an acceptable policy OID before defining acceptable identifiers for user account mapping. You can read more about these AD changes in the following <a class="usa-link usa-link--external" href="https://techcommunity.microsoft.com/t5/public-sector-blog/enable-strong-name-based-mapping-in-government-scenarios/ba-p/4240402" target="_blank" rel="noopener noreferrer">Microsoft Public Sector Blog</a> and you may find additional intallation and configuration instructions at the <a class="usa-link usa-link--external" href="https://community.connect.gov/pages/viewpage.action?pageId=2471068012" target="_blank" rel="noopener noreferrer">CISA Connect.gov site</a> (PIV/CAC authentication available). Full enforcement mode for use of approved identifiers is still planned to go into effect on February 11, 2025 and compatibility mode will be fully retired on September 10th, 2025. See Step 4 below regarding Account Linking for further details.
</p>
</div>
</div>
Expand Down

0 comments on commit 341a2c6

Please sign in to comment.