SafeNet Agent for Windows Logon
Version Number: 4.0.0
Customer Release Notes (CRN) - This document describes capabilities, resolved issues, limitations, and known issues for different product releases.
Product Description
The SafeNet Agent for Windows Logon is designed to help Microsoft enterprise customers ensure that valuable resources are accessible only by authorized users. It delivers a simplified and consistent user login experience, virtually eliminates help desk calls related to password management, and helps organizations comply with regulatory requirements.
The use of Two-Factor Authentication (2FA) instead of just traditional static passwords to access a Windows environment is a critical step for information security.
For a list of existing issues as of the latest release, refer to Known Issues.
Release Description
Release Summary – SafeNet Agent for Windows Logon v4.0.0
The following release has been issued for SafeNet Agent for Windows Logon v4.0.0:
General Availability Release - May, 2024
The SafeNet Agent for Windows Logon 4.0.0 release introduces the following new feature and resolves a customer-reported issue.
Passwordless Windows Logon
This release introduces a new feature Passwordless Windows Logon. It enhances secured access to Windows machines by eliminating the need to provide a password for machine access and beyond, by replacing the password with a certificate-based authentication mechanism. It further eliminates the end-user friction, as users no longer need to manage or remember their passwords. For more details, click here.
Resolved Issues
Issue | Synopsis |
---|---|
SASNOI-8625 | During logon, if a user long presses the Enter key without providing a Passcode, WLA sends a large number of authentication requests to the SafeNet server. To prevent multiple authentication requests to the server, auto-focus is disabled after submission of the blank Passcode. The users can proceed with their journey through the mouse click on the displayed message. |
Known Issues
Issue | Synopsis |
---|---|
SASNOI-20286 | Summary: If Strip realm from UPN is disabled, then outgoing RDP does not work for the passwordless enrolled user with UPN format "username@domain_name". It displays an error "Your credential could not be verified." Workaround: None. It will be fixed in a future release. |
Release Summary – SafeNet Agent for Windows Logon v3.7.0
The following release has been issued for SafeNet Agent for Windows Logon v3.7.0:
General Availability Release - April, 2024
The SafeNet Agent for Windows Logon 3.7.0 release introduces the following three significant features.
User Choice of Authenticators (UCA)
This feature provides the end-users with the option to choose their preferred WLA authentication method during machine logon and unlock, based on their active tokens. The list of authenticators enrolled for the user (in STA) is displayed in a user-friendly way also allowing the user to save the preferred authentication method for subsequent machine logins.
For more details, refer to Running the Solution section.
User Choice of Authenticators (UCA) is only supported for interactive logon use cases. It does not apply to RDP and shared-folder access scenarios.
Multiple Offline Authenticators
This feature allows the end-users to choose their preferred WLA authentication method for machine access in offline mode. The list of authenticators, which support offline authentications, is intuitively displayed to the user to choose from. WLA now maintains the Remaining off-line authentications count for all the cached authenticator types.
Only the authenticators used for at least one online authentication are displayed, to be selected for offline authentication.
For more details, refer to Running the Solution section.
Number Matching
WLA now supports MobilePASS+ push with number matching feature, which secures push authentications to protect against MFA fatigue or push bombing attacks.
Number matching gives control to the user for every login request, because they must select the number in the push notification on their MobilePASS+ application as is displayed on the WLA login screen.
For more details, click here.
Limitation
While accessing an application via Run as different user (in outgoing RDP or shared folder access use cases), the WLA-agent installed machine displays the following UI (different than the number matching UI displayed in all other use cases):
Kiosk Support
The agent is now supported in Kiosk mode for Windows 10 and Windows 11 (64-bit) operating systems.
Resolved Issues
The SafeNet Agent for Windows Logon 3.7.0 release resolves a customer-reported issue.
Issue | Synopsis |
---|---|
SASNOI-19577 | If interactive logon policy Display user information when the session is locked is set to Do not display user information and the user provides an empty username and password during unlock, then the user is blocked from accessing the machine as all subsequent authentications with the correct credentials fail. This issue is now fixed. |
Known Issues
Issue | Synopsis |
---|---|
SASNOI-19730 | Summary: When the tokens assigned to a user in STA are in the suspended state, then, - In online mode, the following error displays during login: No Authenticators found for this user. Please contact your administrator. - In offline mode, all the authenticators on the UCA window are greyed out, and only the Emergency password option is available to log in. Workaround: The user must cancel the error window and log in using the static password (as shared by the administrator). |
SASNOI-19696 | Summary: If there is a delay in performing authentication after entering the passcode, the UCA screen closes and falls back to the Windows screensaver. Workaround: Press Ctrl+Alt+Del to unlock the machine and restart the authentication process. To avoid this from re-occurring, you may add IdleTimeOut (as a 32-bit DWORD with decimal value, for example, 60000) registry entry at the following location and set the idle timeout value as per your preference: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Authentication\LogonUI |
SASNOI-19347 | Summary: During authentication, the PUSH number challenge screen disappears when a user clicks outside this screen. However, the screen remains active and if the user hits the correct number on the PUSH notification, the PUSH is accepted. Workaround: None. It will be fixed in a future release. |
SASNOI-19836 | Summary: While accessing the WLA machine in offline mode, just after an upgrade to v3.7.0, the UCA window displays Emergency password as the only option to log in. Workaround: The user can either cancel the UCA window to use offline OTPs or provide an emergency password to log in. |
Release Summary – SafeNet Agent for Windows Logon v3.6.3
The following release has been issued for SafeNet Agent for Windows Logon v3.6.3:
General Availability Release - March, 2024
The SafeNet Agent for Windows Logon 3.6.3 release resolves some customer-reported issues.
Issue | Synopsis |
---|---|
SASNOI-17859 | During logon or unlock, the user credential fields are displayed with a delay of few (20-30) seconds, due to which a domain user is not able to login into the machine. This behavior is observed during network latency or when the domain controller is inaccessible and was reported in WLA v3.6.0. This issue is now fixed. |
SASNOI-19195 | After upgrading the agent from version 3.5.x to 3.6.x, users are able to login in offline mode only after at least one successful online authentication. This issue is now fixed and the users can login in offline mode without the need of an online authentication. |
SASNOI-19226 | WLA fails to authenticate a user whose username contains “$” and displays an error. After the fix, the username field supports “$" as a valid special character. |
SASNOI-19578 | If Don’t display username at sign-in interactive logon windows policy is enabled, and the user enters incorrect username while unlocking the machine, the Username field is not displayed again to enter the correct credentials. In this case, the user is blocked from accessing the machine. After the fix, the login flow is working as expected. |
SASNOI-18183 | If a user switches from online to offline mode and attempts to launch an application via “Run as administrator” that must use an OTP, then the user is not prompted for an OTP. After the fix, the authentication is working as expected in offline mode. |
SASNOI-18237 | After changing the AD password, the users were not able to login with the changed password. This is now fixed and the users can successfully log in with the changed password. |
SASNOI-13324 | During offline authentication, the agent did not accept emergency password for the user assigned with a GrIDsure token. This issue is fixed and the user with a GrIDsure token can use the emergency password for offline authentication. |
SASNOI-17887 | If an invalid group is a part of the group filtering, the users experience a few minutes of authentication delay while receiving the PUSH notification. This issue is now fixed and the SafeNet authentication with PUSH OTP works as expected. |
Release Summary – SafeNet Agent for Windows Logon v3.6.2
The SafeNet Agent for Windows Logon 3.6.2 release resolves some customer-reported/known issues.
Upgrade Impact
While upgrading the agent, it is recommended to use the latest .agent file. For more details, refer to Upgrading the Agent section.
Resolved Issues
Issue | Synopsis |
---|---|
SASNOI-18390 | While unlocking or logging into a WLA 3.6.1 protected machine, the login screen flickers due to which a user is unable to access the machine. UI flickering is now fixed and the users are presented with the appropriate login screen. |
SASNOI-17922 | During logon/unlock, OTP and password fields are simultaneously displayed for few (10-20) seconds due to which a user is not able to login to the machine. This behavior is observed during network latency and was reported in WLA v3.6.0. This is now fixed and appropriate user credential fields (OTP and password) are displayed during the logon/unlock. |
Release Summary – SafeNet Agent for Windows Logon v3.6.1
The SafeNet Agent for Windows Logon 3.6.1 release resolves some customer-reported/known issues.
Security fix
This release introduces a security fix for the most secure version of SafeNet Agent for Windows Logon. For more details, please refer the security bulletin (ref: 20230704).
Resolved Issues
Issue | Synopsis |
---|---|
SASNOI-16785 | If “Microsoft Password Caching” is enabled and user enters incorrect password while executing an application with administrator privileges, then WLA caches the incorrect password. The user does not get the password prompt to provide the correct password anymore and hence is unable to execute the application. This is now fixed and WLA does not cache the password if incorrect. |
SASNOI-16386 | Offline authentication does not work for domain users added in a local group after restart. This is now fixed by caching the users’ appropriate group and the offline authentication works as expected. |
SASNOI-17409 | If a user provides “*@domain” in the username field, and the log level is set to DEBUG, all the usernames of the domain are written in the agent’s log file. This issue is now fixed by restricting the username field to only support valid username characters or formats. |
Release Summary – SafeNet Agent for Windows Logon v3.6.0
The SafeNet Agent for Windows Logon 3.6.0 release offers some improvements and introduces the following features.
Application Sharing
With this release, a service provider can now share the Windows Logon application across multiple accounts (virtual servers). As a result, the users in each of these virtual servers can authenticate through the agent. Each account will manage the policies that control how their members access the shared applications. The application can be shared with up to 45 accounts that they are delegated to manage.
For more details, click here.
Two new registry settings, ApplicationId and ApplicationName, are introduced to represent the application created in STA.
Agent Deployment via Microsoft Endpoint Configuration Manager
Along with the existing agent deployment methods, Group Policy Object (GPO) and Intune, the agent can now also be deployed via a Windows-centric endpoint management tool, Microsoft Endpoint Configuration Manager, formerly known as Microsoft System Center Configuration Manager (SCCM). It enables the admins to deploy the agent on the client machines within or outside the corporate network.
For more details, refer to Deploying the agent via Microsoft Endpoint Configuration Manager section.
Enhancements
-
The Credential Provider in Policy tab of the SafeNet Windows Logon Agent Manager now defaults to Windows V2 Password Credential Provider. To wrap any other external (third-party) credential provider, for example, Microsoft Credential Provider V1, select Other Credential Provider, and enter its GUID in the subsequent text field. For more details, refer to the Policy section in Management tab.
Additionally, the WLAasV1Provider registry setting has been removed from the ADML and ADMX template.
-
The user messaging has been improved in the existing login UI/UX for near native Windows experience. For new screens, refer to Running the Solution section.
-
The Use GrIDsure Token link, displayed on the login screen is now renamed to Use a grid pattern.
-
A new parameter, AGENTSTATUS is added to enable or disable the agent while installing the agent silently. For more details, refer to the Silent Installation section in Installing the Agent.
Release Summary – SafeNet Agent for Windows Logon v3.5.2
The SafeNet Agent for Windows Logon 3.5.2 release introduces an enhancement and resolves some customer-reported issues.
Enhanced Data Protection
The agent is now compatible with Microsoft Windows native FDE tool, BitLocker.
Extended Operating System Support
The SafeNet Agent for Windows Logon now adds support of Windows Server 2022.
Resolved Issues
Issue | Synopsis |
---|---|
SASNOI-8458 | The EmergencyPassword registry entry was missing in the WLA ADMX template. This registry entry has now been added in the ADML and ADMX template. |
SASNOI-15298 | Under specific scenarios, such as in sleep or hibernate mode, the WLA-protected machine did not prompt for an OTP on logon in accordance with the configured logon policy. After the fix, the agent works as per the applied logon policy. |
SASNOI-12472 | MobilePass+ did not show the application name when authentication request was triggered from a WLA-protected machine. After the fix, the application name (as configured in STA) is now displayed in MP+ for all the authentication requests. |
SASNOI-14179 | The More choices option was not visible while accessing an application with elevated privileges. This issue is fixed and the More choices option is now visible in the sign-in window for the user with elevated privileges. |
SASNOI-16626 | In some rare scenarios, after restarting the machine, the end-users were not able to authenticate in offline mode. This is fixed and the WLA offline authentication is now working correctly. |
SASNOI-15825 | When the laptop’s lid was shut, the Skip OTP on Unlock functionality did not work as expected. This is now fixed and the agent works as per the applied logon policy. |
Release Summary – SafeNet Agent for Windows Logon v3.5.1
The SafeNet Agent for Windows Logon 3.5.1 release introduces a security fix and the following security improvement.
Security Improvement
A new registry setting, SetCachingToCurrentUser, is introduced to augment the secured storage of a user’s cached Microsoft password.
Security Fix
This release introduces a security fix for the most secure version of SafeNet Agent for Windows Logon. For more details, please refer the security bulletin (ref: 18052022).
Release Summary – SafeNet Agent for Windows Logon v3.5.0
The SafeNet Agent for Windows Logon 3.5.0 release introduces the following new features and resolves some customer-reported issues.
Removed Support of exe
From this release onwards, the agent can only be installed and upgraded using msi. Agent installation and upgrade through exe is no longer supported.
Upgrade using msi will not work if you have previously installed the agent via exe. You need to take a backup of the configuration, uninstall the agent, install it again via msi, and then apply your previous configuration.
Azure Active Directory (AD) Support
SafeNet Agent for Windows Logon is now supported for pure and hybrid Azure AD joined machines.
Intune support for deployment of WLA is added. For detailed information, click here.
Limitations
Following are the limitations of WLA agent for Azure AD joined machines:
-
The Exempt Local/Domain Administrator strong authentication will not work with pure Azure AD joined machines for domain admins. However, this feature will work as expected for the local admins.
-
The Group Filter feature will not work with pure Azure AD joined machines for domain groups. However, this feature will work as expected for the local groups.
-
Third-party federation services with Azure AD joined machines are not supported.
Support of Interactive Logon Windows Policies
SafeNet Agent for Windows Logon now supports the following interactive logon windows policies:
-
Do not display last user name
-
Display user information when the session is logged
Microsoft Credential Provider V1 Support
The Microsoft Credential Provider V1 is now only supported for Windows Server 2012.
Resolved Issues
Issue | Synopsis |
---|---|
SASNOI-14865 | WLA did not retain existing users’ cached password after an MFA exempted user logs in to the machine. Subsequently, user/s of the machine are prompted for password on their next login. This is now fixed and the password caching functionality is working as expected. |
SASNOI-14887 | WLA failed to bypass the SafeNet OTP authentication on system unlock when the windows policy was set to hide the username at login/unlock screen. After adding the support for Interactive Logon Windows Policies, this issue is resolved. NOTE: If the windows policy is set to hide the username, the screen will display a generic message "If you normally use a Token, please enter your PIN + OTP otherwise your Windows Password in Password Field". |
Release Summary – SafeNet Agent for Windows Logon v3.4.5
The SafeNet Agent for Windows Logon 3.4.5 release introduces the support of Windows 11 and resolves some customer-reported issues.
Extended Operating System Support
The SafeNet Agent for Windows Logon now adds support of Windows 11 (64-bit).
Resolved Issues
Issue | Synopsis |
---|---|
SASNOI-14353 | After rebooting the WLA installed machine, the end-users were not able to authenticate in offline mode if the domain was not accessible. This is now fixed and the WLA offline authentication is working correctly. |
SASNOI-14381 | The Logon Policy for STA for Unlock and Logon were not applied after rebooting the WLA installed machine. This is now fixed and the Logon Policy is working as expected. |
Release Summary – SafeNet Agent for Windows Logon v3.4.4
The SafeNet Agent for Windows Logon 3.4.4 release introduces some security fixes and improvements.
-
The Microsoft password of the domain administrators are no longer cached and stored by SafeNet Agent for Windows Logon.
-
The Microsoft password of other users are now protected with additional layers of encryption.
Security Fix
This release introduces security fixes for the most secure version of SafeNet Agent for Windows Logon. For more details, please refer the security bulletin (ref: 2021112).
Release Summary – SafeNet Agent for Windows Logon v3.4.3
The SafeNet Agent for Windows Logon 3.4.3 release resolves some customer-reported issues.
Security Fix
This release introduces a security fix for the most secure version of SafeNet Agent for Windows Logon. For more details, please refer the security bulletin (ref: 14102021).
Resolved Issues
Issue | Synopsis |
---|---|
SASNOI-12798 | WLA ignored the users in the exempted group and prompted for multi-factor authentication for all the users after a machine restart. This is now fixed and WLA does not prompt for MFA for users who are in the exempted group. |
SASNOI-12894 | When a user initiated an RDP session from a WLA protected machine, the "more choices" option was not visible thereby inhibiting the Switch User functionality. This is fixed, now the "more choices" option is visible and the Switch User functionality is accessible. |
SASNOI-12787 | Multi-factor authentication was bypassed when
the group filter is selected to "Only selected groups must use SafeNet"
by entering a username in an incorrect email format. For more details please refer the security bulletin (ref: 14102021). |
SASNOI-13543 | For user logins configured to "Skip OTP on Unlock", the WLA protected machine used to hang during system unlock, if the user provides the correct password preceded by two incorrect password attempts. After the fix, the machine no longer hangs for the above scenario. |
Release Summary – SafeNet Agent for Windows Logon v3.4.2
The SafeNet Agent for Windows Logon 3.4.2 release resolves some customer-reported issues.
Resolved Issues
Issue | Synopsis |
---|---|
SASNOI-12926 | The WLA offline authentication is now working correctly. |
SASNOI-12391 | The WLA login does not hang even if it does not have access to the VPN. The offline authentication works correctly in this case. |
SASNOI-13027 | The login screen flickering issue in Windows 10 is now resolved. |
Release Summary – SafeNet Agent for Windows Logon v3.4.0
The SafeNet Agent for Windows Logon 3.4.0 release supports the below new features.
Network/IP based Policies for Logon
The SafeNet Agent for Windows Logon can now synchronize with the IP network based policy within the STA console for logon scenario. The re-authentication time for Windows logon is decided based on the public IP range specified in the policy. After the re-authentication time expires, users enabled with this policy would be prompted for an OTP.
- The logon policy feature is not supported in Remote Desktop Protocol (RDP) sessions.
- Currently, IPv6 is not a supported format for the logon policy.
Thales Branding
The SafeNet Agent for Windows Logon has been redesigned with the Thales branding.
With this release, the Management Console name is changed to SafeNet Windows Logon Agent Manager.
Reduced Operating System Support
The SafeNet Agent for Windows Logon v3.4.0 has now stopped the support for Windows 7 (32-bit, 64-bit) and Windows Server 2008 R2 (64-bit).
Release Summary – SafeNet Agent for Windows Logon v3.3.3
The SafeNet Agent for Windows Logon 3.3.3 release resolves a customer-reported issues.
Resolved Issues
Issue | Synopsis |
---|---|
SASNOI-12141 | The Windows 2019 machine now does not hang when the user (who is not a part of MFA group) logins successfully through WLA after 2-3 wrong attempts initially. |
SASNOI-12257 | The login functionality now works correctly and the user does not get prompted for an OTP again if they enter a wrong AD password. |
Release Summary – SafeNet Agent for Windows Logon v3.3.2
The SafeNet Agent for Windows Logon 3.3.2 release resolves some customer-reported issues.
Resolved Issues
Issue | Synopsis |
---|---|
SASNOI-11688 | On cancelling the PUSH authentication from the WLA login screen, the request took longer than expected to go back to the normal logon screen. Code refactoring has been done to resolve the issue. |
SASNOI-11427 | The PUSH message on the Windows Logon Agent did not show where the request was coming from. Now, the PUSH authentication request successfully displays a proper message on the pop-up window. |
Release Summary – SafeNet Agent for Windows Logon v3.3.0
The SafeNet Agent for Windows Logon 3.3.0 release introduces the below new features and resolves a customer-reported issue.
Network/IP based Logon Policies
The SafeNet Agent for Windows Logon can now synchronize with the IP network based policy within the STA console. The re-authentication time for Windows unlock is decided based on the public IP range specified in the policy. After the re-authentication time expires, users enabled with this policy would be prompted for an OTP.
Currently, IPv6 is not a supported format for the logon policy.
Extended Operating System Support
The SafeNet Agent for Windows Logon v3.3.0 now supports Windows Server 2019 (64-bit).
Resolved Issues
Issue | Synopsis |
---|---|
SASNOI-8729 | The Remaining off-line authentications is now displayed correctly in the SafeNet Windows Logon Agent Manager window. |
Known Issues
The below table provides a list of known issues as of the latest release.
Issue | Synopsis |
---|---|
SASNOI-11134 | Summary: Wrong proxy password given in WLA, the scenario is not working as expected. Workaround: Restart the WLANotificationService. |
Functionality not supported
The following functionality is not supported by SafeNet Agent for Windows Logon:
-
Skip OTP on Unlock with Remote Desktop Access
There is no ReAuth token created when the user logs in through RDP for this. Hence, an error displays as there is no token found when verified for session validation.
Release Summary – SafeNet Agent for Windows Logon v3.2.0
The SafeNet Agent for Windows Logon 3.2.0 release introduces two new features and resolves a customer-reported issue.
Re-Authentication after Session Expiry
The SafeNet Agent for Windows Logon can now synchronize with the re-authentication time logon policy within the STA console. After the re-authentication time expires, users enabled with this policy would be prompted for an OTP.
Remotely configuring agent through GPO after installation
The SafeNet Agent for Windows Logon now allows the administrators to configure the agent with the updated configurations: Server Connection URLs and BSIDKey, remotely via GPO. With this release, the Agent Management Console is enhanced to pick up configurations from the latest agent file in the Installation Directory and configure the agent with the relevant values automatically. For more details, refer to the SafeNet Agent for Windows Logon Installation and Configuration Guide.
Resolved Issues
Issue | Synopsis |
---|---|
SASNOI-10179 | Group filtering on SafeNet Agent for Windows Logon is now working correctly. |
Known Issues
The below table provides a list of known issues as of the latest release.
Issue | Synopsis |
---|---|
SASNOI-10817 | Summary: The Skip OTP functionality for SafeNet Agent for Windows Logon does not work as expected. If the WLA Notification Service is either stopped or deleted, the agent fails to bypass the SafeNet OTP authentication on system unlock. Workaround: None, will be fixed in a future release. |
SASNOI-11008 | Summary: On Windows 8.1 unlock, the system does not always prompt for an OTP after a specific re-authentication time. Workaround: None, will be fixed in a future release. |
Release Summary – SafeNet Agent for Windows Logon v3.1.1
The SafeNet Agent for Windows Logon 3.1.1 release resolves a customer-reported issue.
Resolved Issues
Issue | Synopsis |
---|---|
SASNOI-10566 | The users logged in the system using only the Windows password, bypassing the Push OTP if the authentication attempt is timeout. Now, the login functionality works correctly, and the SafeNet Authentication with the PUSH OTP is not bypassed erroneously. |
Known Issues
The below table provides a list of known issues as of the latest release.
Issue | Synopsis |
---|---|
SASNOI-10665 | The Skip OTP on Unlock feature does not work as expected as Logon tab is disabled on STA. For the new users, the Skip OTP at Unlock will not work via the Agent Management Console. |
Release Summary – SafeNet Agent for Windows Logon v3.1.0
The SafeNet Agent for Windows Logon 3.1.0 release introduces a new feature and resolves some customer-reported issues. This release has reintroduced the support for the FIPS mode.
Logon Policies Sync with STA
This release will enable SafeNet Agent for Windows Logon to sync logon policies configured from the STA console. Now, customer or operator can configure logon policies from the STA console through the Logon Policies tab and configured policies are synced with SafeNet Agent for Windows Logon on the next authentication request.
Resolved Issues
Issue | Synopsis |
---|---|
SASNOI-6639 | WLA server status check and Authentication from console is working fine now with TVP (Enable SSL Certificate Check). |
SASNOI-10258 | Users can now login to the agent in the Spanish language. While log in to the agent, there is no need to change the language. |
Release Summary – SafeNet Agent for Windows Logon v3.0.0
The SafeNet Agent for Windows Logon 3.0.0 release introduces a new feature. This release excludes the support for the FIPS mode.
WLA Integration with STA
This release will enable the SafeNet Agent for Windows Logon to be integrated with STA. Now, customer or operator can add the WLA application within the application management and download installer, configuration and GPO files from the STA console. With this release, the installer is also enhanced to pick up the server connection configurations from the relevant file and automatically configure the agent.
Release Summary – SafeNet Agent for Windows Logon v2.3.5
The SafeNet Agent for Windows Logon 2.3.5 introduces support for:
- The FIPS mode within the operating system with AES-GCM and RSA key standards.
- The FIPS mode for decrypting the agent’s BSID key.
Release Summary – SafeNet Agent for Windows Logon v2.3.2
The SafeNet Agent for Windows Logon 2.3.2 release resolves some customer-reported issues.
Resolved Issues
Issue | Synopsis |
---|---|
SASNOI-8920 | The agent now enforces Local Administrator Accounts through GPO or Registry. |
SASNOI-9013 | The domain security group are not excluded from Two-Factor Authentication (2FA). |
SASNOI-9761 | If logged in user's user ID is single character, the agent not display offline OTP count. |
Release Summary – SafeNet Agent for Windows Logon v2.3.1
The SafeNet Agent for Windows Logon 2.3.1 release resolves some customer-reported issues.
Resolved Issues
Issue | Synopsis |
---|---|
SASNOI-9046 | The agent now enforces 2FA for users who login using alternate UPN suffix. |
SASNOI-9045 | The Windows Logon screen does not become unresponsive on losing the network connection. Code refactoring has been done, ensuring that if the login functionality does not work, the users are authenticated using the offline mode. |
SASNOI-8855 | The group membership functionality now applies correctly, ensuring that the members in the bypass SafeNet authentication group can now login using only their AD credentials. |
SASNOI-8849 | Some code modifications have been made, improving the login speed of the agent. |
SASNOI-8839 | If an internet timeout error is encountered, the users are authenticated using the offline mode. |
Release Summary – SafeNet Agent for Windows Logon v2.3.0
The SafeNet Agent for Windows Logon 2.3.0 release introduces two new features.
Bypass SafeNet Authentication on System Unlock
The SafeNet Agent for Windows Logon now allows the administrators to bypass SafeNet OTP authentication on system unlock. The feature, Skip OTP on Unlock reduces friction of entering OTP every time a user unlocks a machine. For more details, refer the SafeNet Agent for Windows Logon Installation and Configuration Guide.
Bypass SafeNet Authentication for All Applications
The SafeNet Agent for Windows Logon now allows the administrators to bypass SafeNet OTP authentication for all applications at once, by adding a wildcard, an asterisk (*) in the FilterProcess Registry flag. The feature is useful in instances where an administrator does not explicitly want to add all the applications that must be excluded from the OTP authentication. For more details, refer the SafeNet Agent for Windows Logon Installation and Configuration Guide.
Release Summary – SafeNet Agent for Windows Logon v2.2.8
The SafeNet Agent for Windows Logon 2.2.8 release introduces an enhancement and resolves some customer-reported issues.
Enhanced Security
The AES-GCM encryption algorithm is now used to provide faster and a more secure way to protect data exchange between the SafeNet Agent for Windows Logon and the SAS solution. Enabled by enhanced security, the agent delivers a more robust, and dependable authentication experience. A more secure key standard, like AES-GCM, can also help you comply with your organization's security policy requirements.
This feature is supported on SAS Cloud and SAS PCE/SPE v3.8.1 onwards.
To use the AES-GCM key standard, the administrator has to download a new Agent.bsidkey file from the SAS, and update the same (in the agent) at Configuration Management > Communications > Agent Encryption Key File.
Resolved Issues
Issue | Synopsis |
---|---|
SASNOI-8871 | Leading and trailing spaces in usernames will now be removed by the agent, and only the trimmed values will be passed to the Active Directory for group lookup. This ensures that the group filter functionality applies correctly, and the SafeNet authentication is not bypassed, erroneously. |
SASNOI-8651 | MSI silent installation documentation enhanced. For details, refer SafeNet Agent for Windows Logon Installation and Configuration Guide. |
SASNOI-8622 | The SafeNet Agent for Windows Logon will now correctly authenticate users via the offline mode even during network connectivity issues or unavailability of the Domain Controller. The issue was encountered since the user groups were getting partially fetched due to network disruptions, leading to authentication bypasses. |
SASNOI-8309 | Users will now be able to successfully authenticate to their machines after a Sleep operation. |
SASNOI-6646 | Group Filter functionality (available on the Policy tab of the SafeNet Windows Logon Agent Manager) now works for users in the external domain, allowing administrators to enforce or bypass the SafeNet authentication, as per their requirements. |
SASNOI-3115 | Administrators will now be able to successfully authenticate to a user's machine (as the user) using the emergency password. |
Release Summary – SafeNet Agent for Windows Logon v2.2.7
The SafeNet Agent for Windows Logon 2.2.7 release introduces new features and resolves some customer-reported issues.
Exclude Credential Filters
Administrators can modify the CompatibleFilters registry entry to add Credential Filters of specific Credential Providers, which are compatible and can be wrapped with our custom Credential Provider. For more details, refer the SafeNet Agent for Windows Logon Installation and Configuration Guide.
Bypass SafeNet Authentication
To prevent applications from applying the SafeNet authentication, administrators can modify the FilterProcess registry entry. For more details, refer the SafeNet Agent for Windows Logon Installation and Configuration Guide.
Resolved Issues
Issue | Synopsis |
---|---|
SASNOI-8245 | A correct error message is displayed when SAS service is timed out during the logon process. |
SASNOI-8237 | Users can configure Communication Timeout field up to 1 second. |
SASNOI-8234 | ACL vulnerability is now fixed for WLA agent. |
SASNOI-7855 | Users can logon using the WLA agent with maximum supported PIN length and number of disconnected authentications. |
SASNOI-6858 | Incompatible Filter warning is removed for SpecOps uReset client when accessing SafeNet Windows Logon Agent Manager console. |
Release Summary – SafeNet Agent for Windows Logon v2.2.6
The SafeNet Agent for Windows Logon 2.2.6 release resolves some customer-reported issues.
Resolved Issues
Issue | Synopsis |
---|---|
SASNOI-8143 | The Communication Timeout setting will now work even if there is congestion or blockage in the underlying network. |
SASNOI-8069 | Users will now be able to successfully login, after a reboot or from the lock screen, using the V2 credential provider. The SafeNet Agent for Windows Logon now submits authentication requests in the correct format, REALM\username. |
Release Summary – SafeNet Agent for Windows Logon v2.2.5
The SafeNet Agent for Windows Logon 2.2.5 release resolves some customer-reported and known issues.
Resolved Issues
Issue | Synopsis |
---|---|
SASNOI-7773 | It is now possible to switch between users even if the SafeNet Agent for Windows Logon is in the enabled state. |
SASNOI-7623 | The Username field cannot be edited after providing an incorrect AD password, ensuring that login attempts by any other user are not possible. |
SASNOI-7506 | The credential tile provider, Courion AD Password Reset (Core Security, SecureAuth), now wraps correctly with the SafeNet Agent for Windows Logon v2.2.1. |
Release Summary – SafeNet Agent for Windows Logon v2.2.4
The SafeNet Agent for Windows Logon 2.2.4 release includes a feature enhancement, and resolves some known issues.
Domain Groups not Nested in Local Groups
The option, Domain groups are not nested in Local group, if selected indicates that no Nested Groups (Domain groups are nested in the Local group) are present inside the Selected Groups field. Domain lookup is skipped in such a case, helping improve the login delay time.
To enable this option, navigate to SafeNet Windows Logon Agent Manager > Policy > Group Authentication Exceptions.
Resolved Issues
Issue | Synopsis |
---|---|
SASNOI-7340 | The SafeNet Agent for Windows Logon now switches over to the primary SAS server (if it becomes available) before the timeout if the secondary SAS server is not configured, or is unavailable. |
SASNOI-7230 | The performance of the SafeNet Agent for Windows Logon is enhanced, ensuring that it logins faster. |
SASNOI-7022 | The SafeNet Agent for Windows Logon now allow users to successfully authenticate (using Offline authentication) using Windows 10 machines when connected through a Wi-Fi network, not connected to the LAN. |
SASNOI-6901 | The SafeNet Agent for Windows Logon v2.1 now allow users to login successfully using certificate/ smartcard based authentications. |
SASNOI-6328 | All exempted AD users of nested groups are now correctly bypassed from SAS OTP authentication. |
SASNOI-3012 | Since .NET 3.5 Framework is deprecated for Windows 8.1/10, the dependency to install it for running the agent, is now removed. The SafeNet Agent for Windows Logon works on .NET 4.5 Framework. |
Release Summary – SafeNet Agent for Windows Logon v2.2.1
The SafeNet Agent for Windows Logon 2.2.1 resolves a customer-reported defect.
Resolved Issues
Issue | Synopsis |
---|---|
SASNOI-7200 | Normal users will now be able to access the SafeNet Agent for Windows Logon console without any error. |
SASNOI-6710 | After a user’s password reset, the user will now be able to change his or her password at the time of next login. |
Release Summary – SafeNet Agent for Windows Logon v2.2.0
The SafeNet Agent for Windows Logon 2.2.0 introduces a new feature and resolves some customer-reported defects.
Third Party Network Provider Software Compliance
It provides the following two options:
- Allow all applications: This option allows you to install the agent without updating the registry keys under
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\NetworkProvider\Order]
. This option is selected by default on the Management console.
Sometimes, selecting this option creates a conflict between the SafeNet Agent for Windows Logon and the third-party network provider software. In such a case, you need to uninstall the third-party network provider software and remove its registry entry. Before executing this operation, you need to perform the following steps:
1. Ensure that the Allow all applications option is selected, and click Apply.
2. Close the Management console.
- Allow only SafeNet compliant applications: This option allows you to reset the registry key under
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\NetworkProvider\Order] to
“ProviderOrder"=" RDPNP,LanmanWorkstation,webclient"
.
Resolved Issues
This release resolves some known issues. Please find below details of the solutions provided.
Issue | Synopsis |
---|---|
SASNOI-6691 | User will now be able to add local groups in the SafeNet Agent for Windows Logon. |
SASNOI-6601 | After the agent installation or while opening the Windows Logon Agent console, the network provider doesn’t get changed automatically. |
SASNOI-6563 | The Windows Logon Agent is now working as per the proxy server settings. |
Release Summary – SafeNet Agent for Windows Logon v2.1
The SafeNet Agent for Windows Logon 2.1 introduces new features and resolves some customer-reported defects.
Allow Network Path without OTP
A capability to allow enabling/ disabling network path access without OTP is added to Policy tab of SafeNet Windows Logon Agent Manager. The Allow windows explorer without OTP checkbox, if enabled, allow Windows explorer to run without SafeNet Authentication (bypassing the SafeNet OTP option).
Extended Operating System Support
The SafeNet Agent for Windows Logon 2.1 now supports Windows Server 2016 (64-bit).
Support for Credential Providers
Support for the following Credential Providers is added:
-
Microsoft Credential Provider Tile Version 1 (V1)
-
Microsoft Credential Provider Tile Version 2 (V2)
-
Other [external (third-party)] Credential Provider(s) (like, ServiceNow)
Wrap Third-Party Credential Providers
By default, the SafeNet Agent for Windows Logon wraps Microsoft Credential Provider. A new setting enables an administrator to wrap other external providers as well.
Display Other Credential Providers
By default, the SafeNet Agent for Windows Logon filters out (do not display) any other credential provider. Using DoNotFilter registry entry, the administrators can enable a view where other credential providers can also be displayed.
Resolved Issues
This release resolves some known issues. Please find below details of the solutions provided.
Issue | Synopsis |
---|---|
SASNOI-6583 | Users will now be able to successfully login to Windows 10 machines via RDP using AD credentials. Allow outgoing RDP connection without OTP functionality is fixed, ensuring that SAS authentication can be bypassed, if required, when making an outgoing RDP connection. |
SASNOI-6554 | The cursor now positions back to the Password field after an unsuccessful login attempt. |
SASNOI-6327 | Unlocking a Windows 10 machine (after the SafeNet Agent for Windows Logon 2.1 installation, but on a machine not having ServiceNow) now displays the login screen. Earlier, it used to display only a blank screen. |
SASNOI-6318 | Login Tiles on a Windows 7 machine (after the SafeNet Agent for Windows Logon 2.1 installation, but on a machine not having ServiceNow) are now displayed even after entering ServiceNow GUID in WrapCredentialProvider registry entry. |
SASNOI-6256 | Users will now be able to access the network shared path on Windows 8 (and 8.1) machines. |
SASNOI-6225 | The Hide Microsoft credential tile option (of Credential Tile Filter dropdown menu in the Policy tab) now hides the Windows credential tile from the user. |
SASNOI-6220 | The Username field is now available with non-English languages on Windows 10 machines. |
SASNOI-6169 | The authentication conflict between the SafeNet Agent for Windows Logon and Govt CAC Smart Card login is now resolved by adding capability that allows to enable/ disable network path access without OTP. The Allow windows explorer without OTP check box, if enabled, allow Windows explorer to run without SafeNet Authentication (bypassing the SAS OTP option). |
SASNOI-6133 | The message, If you normally use a Token, please enter your PIN + OTP otherwise your Windows Password in Password Field now also displays for Windows 7 login screens, making it consistent with Windows 8 and Windows 10 login screens. |
SASNOI-6131 | The Other User tile, which was earlier displayed when a user attempted to log-off/ switch user on a Windows 7 machine, is now removed. When a user now attempts to log-off/ switch user on a Windows 7 machine, the user will directly be prompted for an OTP to unlock the machine. |
SASNOI-2890 | The SafeNet Agent for Windows Logon 2.1 now supports .NET 4.5 package, thus resolving the TLS 1.1/1.2 issue over Hyper Text Transfer Protocol Secure (HTTPS) connections. |
SASNOI-2721 | The support for Microsoft Credential Provider Tile Version 2 ensures that third-party password reset tools now displays password reset text link while the SafeNet Agent for Windows Logon is enabled and working. |
Release Summary – SafeNet Agent for Windows Logon v2.0
The SafeNet Agent for Windows Logon 2.0 introduces new features and repairs several customer-reported defects.
Push Authentication
The SafeNet Agent for Windows Logon supports Push OTP when working with MobilePASS+.
Push Authentication is supported when working with SAS Cloud Edition. For SAS PCE/SPE, Push Authentication is only supported with version 3.9 (and onwards).
ADMX Support
The SafeNet Agent for Windows Logon 2.0 supports the use of ADMX files for defining the Administrative Template policy settings in the Windows Group Policy tools.
Active Directory Search
Performance of the Active Directory Search feature has been enhanced.
Proxy Server Settings
Proxy server settings can now be configured in the Configuration Management interface.
Gemalto Branding
The SafeNet Agent for Windows Logon Management user interface has been redesigned with Gemalto branding.
Resolved Issues
This release resolves some known issues. Please find below details of the solutions provided.
Issue | Synopsis |
---|---|
SASNOI-2882 | The SafeNet Agent for Windows Logon now supports TLS 1.1/1.2 on Windows 7 with the agent configured without TVP. |
SASNOI-3132 | Windows password is now validated correctly in Windows 10 Spanish. |
SASNOI-2963 | The Exempt Administrator feature now functions as expected. |
SASNOI-2892 | Windows 10 now remembers the previous user name. |
SASNOI-2907 SASNOI-3113 | Performance has been greatly enhanced when logging on with the SafeNet Agent for Windows Logon. |
SASNOI-2896 | In Windows 8 the Switch User option is now supported. |
SASNOI-2897 | The GrIDsure logon grid is now displayed at an appropriate size and with a high visual quality. |
SASNOI-3122 | The failover setting (selected or not selected) configured during the installation process is now applied correctly in the Configuration Management window following installation. |
SASNOI-2978 | The Windows Group Policy security settings option Do not display last user name now functions correctly. |
Advisory Notes
Proxy Settings Following Upgrade
If proxy was activated in the SafeNet Agent for Windows Logon 1.13, to continue working with proxy following upgrade to version 2.0, go to Configuration Management > Communications > Proxy Settings, enter the credentials (username and password) and click Apply.
Known Issues
The following table provides a list of known issues as of the latest release.
Issue | Synopsis |
---|---|
SASNOI-20077 | Summary: [Legacy] In Windows 11, if a user attempts to launch an application via "Run as different user", then the user is not prompted for 2FA. Workaround: None. It will be fixed in a future release. |
SASNOI-19218 | Summary: The "Exempt Local/Domain Administrator strong authentication" feature does not work for the users of a custom domain group who are also a nested member of any of the following built-in groups. - Domain Admins - Enterprise Admins - Schema Admins - Group Policy Creator Owner In this case, the users are not able to bypass the SafeNet OTP and they need to login via MFA. Workaround: None. It will be fixed in a future release. |
SASNOI-19527 | Summary: Offline authentication does not work after the agent upgrade from v3.4.x. Workaround: The end-users need to perform at least one successful online authentication for subsequent offline login attempts. |
SASNOI-17150 | Summary: The default value of 10, for the Minimum offline threshold setting in the management console cannot be changed. Workaround: None. It will be fixed in a future release. |
SASNOI-14902 | Summary: After upgrading the agent, the password caching feature does not work when logging in to a WLA protected machine, even if Enable Microsoft Password Caching is selected in the SafeNet Windows Logon Agent Manager > Policy tab. Workaround: After the upgrade, users need to provide their password for the first login to a WLA protected machine. For subsequent logins, password caching feature works as expected. It will be fixed in a future release. |
SASNOI-12552 | Summary: The Skip OTP on Unlock feature does not work for the subsequent unlock after logout. Post that one instance, it works as expected. |
SASNOI-12518 | Summary: After configuring network policy for skipping OTP on logon, OTP won't be skipped for a new user logging in for the first time using "other user" logon tile. For all subsequent login attempts for that user, OTP would be skipped according to the network policy. |
SASNOI-8630 | Summary: It is not possible to enforce SafeNet authentication on nested groups over an external domain. Workaround: None, will be fixed in a future release. |
SASNOI-2825 | Summary: In Windows 8, 10, Server 2012 and Server 2012 R2, the Autoadminlogon feature does not function. Workaround: None, will be fixed in a future release. |
SASNOI-3323 | Summary: Hybrid Mode is not supported when a Local User is included in a Domain Group. Workaround: None, will be fixed in a future release. |
SASNOI-2818 | Summary: If SafeNet Agent for Windows Logon is installed on an Exchange Server machine, when accessing the Windows Logon agent application console, the user is prompted for an OTP password when not required. Workaround: None, will be fixed in a future release. |