Skip to main content
U.S. flag

An official website of the United States government

Dot gov

The .gov means it’s official.
Federal government websites often end in .gov or .mil. Before sharing sensitive information, make sure you’re on a federal government site.

Https

The site is secure.
The https:// ensures that you are connecting to the official website and that any information you provide is encrypted and transmitted securely.

Group Policies and Enforcement

The US Government publishes the United States Government Configuration Baseline (USGCB) for use by Executive Branch agencies to promote uniform configurations for commonly used operating systems. The USGCB configuration guidelines for specific operating systems include references to some configurations related to smartcard (PIV) logon and should be referenced first.

The information on this page is to answer questions and identify the most commonly used configuration options. For a full reference of options for each operating system, please refer to configurations guides published by other sources online.

Machine Based Enforcement versus User Based Enforcement

There are two options for requiring users to use PIV credentials to authenticate to the network domain:

  • Machine Based Enforcement (MBE)
  • User Based Enforcement (UBE)

These options are controlled by group policy applied to either Machine or User objects in your network domain. There is planning required to move to full User Based Enforcement and agencies are often using a combination of both Machine and User enforcement in their deployments.

User Based Enforcement

The user's password will no longer be known by the user. Look for agency internal applications that are still using Username and Password and performing Form Based Authentication against the network directories. Fix these using Kerberos, SAML or direct x509 authentication.

Impacts and considerations are identified to help you plan and execute according to your agency network and user needs.

Type Impacts Considerations
Machine Based Enforcement The user is required to use their PIV credential to authenticate to each device where the policy is applied. The user password is maintained.
User Based Enforcement The password stored for the user is removed, and changed to a long hash value unknown to the user. Your users no longer have passwords for the network. Any applications which were implemented to prompt your users for a username and password and which are using your network domain directories will no longer be accessible.

Your applications impacted by User Based Enforcement are designed or deployed using: a) Form Based or Basic Authentication, or 2) LDAP simple binds. The user will be presented with the application form to enter a username and password and the user will no longer have the password.

You want to analyze your applications and identify which are configured to use your users’ network domain passwords. There are methods to fix the applications by enabling Kerberos, SPNEGO (web applications), direct x509 authentication (client certificate authentication), or the SAML and Open ID Connect (OIDC) protocols. These topics will be covered in the Applications section of the guides which are in-development and we invite all to contribute to!

Defining the policies for Machine Based Enforcement or User Based Enforcement

The setting to enforce PIV logon is controlled by scforceoption in your network domain user and workstation policies.

  • Machine Based Enforcement is when you apply the scforceoption to a workstation or server object in your network domain.
  • User Based Enforcement is when you apply the scforceoption to a user in your network domain.

This is the only difference when implementing the policy: which objects in your domain you apply the policy to.

You can set the policy option on a single user by checking the Smart Card is required for interactive logon check box in the user account properties. You can also apply this setting using group policy objects. When the scforceoption setting is applied, the SMARTCARD_REQUIRED flag is added to the UserAccountControl (UAC) and the DONT_EXPIRE_PASSWORD attribute is set to true.

Defining Kerberos Policies for Reauthentication

Although users can PIV authenticate to domain controllers, the client and the domain controller mantain those sessions using kerberos tickets.

Group policies can be configured by domain administrators to align with local security policies for maximum lifetimes of kerberos user tickets. This may cause users to be prompted to reauthetnicate with their PIV when prompted with one of the following options:

  • Windows Needs Your Current Credentials
  • Please Lock this computer, then unlock it using your most recent password or smart card

These prompts happen when the kerberos ticket lifetime expires and a new authentication event is required. User is set to user based enforcement, which requires a new PKINIT event with the domain controller.

You can find additional information on configuring kerberos policies given the following reference documentation.