KB010: Configure Continuous Face Authentication
Article ID: KB010
Last Updated: June 21, 2025
Applies To: HySecure Gateway 7.1 and above
Category: Security & Authentication Enhancements
Overview
This guide explains how to configure biometric face authentication with continuous monitoring support for the Windows HyID Client. This enhancement extends beyond basic face authentication to provide ongoing user verification during active sessions, thereby improving security through continuous user presence validation.
Prerequisites
- HySecure Gateway 7.1 or higher
- Security Officer or Administrator access to the HySecure Management Console
- The face authentication server is configured and operational.
- Credential Provider is installed on client devices.
- Devices with camera capability for biometric authentication
Benefits
- Enhanced Security: Continuous user verification during sessions.
- Session Protection: Detect unauthorized session access.
- Improved Compliance: Meet advanced biometric authentication requirements.
- User Presence Validation: Ensure the authorized user remains at the device.
Authentication Modes
Basic Face Authentication
- Single Verification: Face authentication during login only.
- Session Duration: No ongoing verification after initial login.
- Security Level: Standard biometric protection.
Continuous Monitoring (New Feature)
- Ongoing Verification: Periodic face authentication during the session.
- Real-Time Protection: Continuous user presence validation.
- Enhanced Security: Detect session hijacking or unauthorized access.
- Configurable Intervals: Adjustable monitoring frequency.
Procedure
Step 1: Access HyID Policy Configuration
-
Log in to Management Console
- Log in to HySecure Management Console as a Security Officer or Administrator.
-
Navigate to HyID Policies
-
Go to Policies > HyID.
-
Select an existing HyID policy or create a new one.
-
Step 2: Configure Face Authentication
-
Select Face Authentication Token
-
In the MFA token list, select Face Authentication.
-
Ensure face authentication is enabled for the policy.
-
-
Navigate to Face Authentication Settings
-
Scroll to the end of the HyID policy configuration page.
-
Find the Face Authentication Server section.
-
Step 3: Enable Continuous Monitoring
-
Locate Facial Authentication Category
-
Find the Facial Authentication Category section.
-
Look for continuous monitoring options.
-
-
Enable Continuous Monitoring
-
Check the option Enable Continuous Monitoring.
-
This activates ongoing face verification during user sessions.
-
-
Save Configuration
-
Click Save or Submit to apply changes.
-
Verify that the configuration is saved successfully.
-
Configuration Options
Monitoring Frequency Settings
Available Options:
-
High Frequency: Verification every 2-5 minutes
-
Medium Frequency: Verification every 10-15 minutes
-
Low Frequency: Verification every 30-60 minutes
-
Custom Interval: Administrator-defined timing
Monitoring Triggers
Time-Based Triggers:
-
Periodic verification at set intervals.
-
Random verification within time windows.
-
Activity-based verification scheduling.
Failure Handling
Authentication Failure Actions:
-
Session Lock: Lock the session until re-authentication.
-
Session Termination: End session immediately.
-
Warning Notification: Alert user and continue monitoring.
-
Administrative Alert: Notify the security team of failure.
User Experience Considerations
Notification Settings
User Notifications:
-
Advance Warning: Notify the user before verification is required.
-
Verification Prompt: Clear instructions for face positioning.
-
Status Updates: Confirmation of successful verification.
-
Failure Messages: Clear guidance when verification fails.
Camera Requirements
Technical Requirements:
-
Camera Quality: Minimum resolution for reliable detection.
-
Lighting Conditions: Adequate lighting for face recognition.
-
Positioning: Proper camera angle and distance.
-
Privacy: User privacy considerations and consent.
Implementation Considerations
Deployment Strategy
Pilot Implementation:
-
Test Group: Start with a limited user group.
-
Monitoring: Observe user experience and technical issues.
-
Feedback: Collect user feedback and adjust settings.
-
Gradual Rollout: Expand to larger user groups.
-
Full Deployment: Organization-wide implementation.
User Training Requirements
Training Topics:
-
Proper camera positioning for face authentication.
-
Understanding continuous monitoring prompts.
-
Troubleshooting common authentication issues.
-
Privacy and security benefits explanation.
Privacy and Compliance
Privacy Considerations:
-
User consent for biometric data collection
-
Data storage and retention policies
-
Cross-border data transfer implications
-
Compliance with local privacy regulations
Regulatory Compliance:
-
GDPR compliance for biometric data
-
Industry-specific requirements (HIPAA, SOX, etc.)
-
Data protection impact assessments
-
Regular compliance audits
Monitoring and Management
Session Monitoring
Real-Time Monitoring:
-
Active session tracking with continuous authentication.
-
Authentication success/failure rates.
Reporting and Analytics
Authentication Reports:
-
Failed authentication analysis
-
Security incident correlation
Administrative Controls
Policy Management:
-
Enable/disable continuous monitoring per user group.
-
Adjust monitoring frequency based on security requirements.
-
Configure failure handling policies.
-
Manage exceptions and special cases.
Troubleshooting
Common Issues:
Continuous Monitoring Not Working:
-
Check: HyID policy configuration.
-
Verify: Face authentication server connectivity.
-
Confirm: Credential Provider version compatibility.
-
Test: Basic face authentication functionality first.
Frequent Authentication Failures:
-
Cause: Poor lighting conditions
-
Solution: Improve workspace lighting
-
Check: Camera quality and positioning.
-
Adjust: Monitoring frequency if too aggressive.
User Complaints About Interruptions:
-
Review: Monitoring frequency settings
-
Consider: Adjusting interval timing.
-
Evaluate: User workflow patterns.
-
Balance: Security needs vs. user productivity
Diagnostic Steps
Verify Configuration:
-
Check the HyID policy has face authentication enabled.
-
Confirm the continuous monitoring option is checked.
-
Verify face authentication server is operational.
-
Test basic face authentication functionality.
Test User Experience:
-
Log in with face authentication.
-
Verify that continuous monitoring prompts appear.
-
Test authentication failure scenarios.
Best Practices
Configuration Best Practices
Optimal Settings:
-
Start with moderate monitoring frequency.
-
Adjust based on security requirements and user feedback.
-
Use appropriate failure handling for the organizational culture.
-
Regular review and optimization of settings.
User Experience Optimization:
-
Provide clear user communication about feature benefits.
-
Offer training and support for face authentication.
-
Monitor user satisfaction and adjust accordingly.
-
Consider user workflow patterns in the configuration.
Operational Best Practices
Monitoring and Maintenance:
-
Regular review of authentication success rates.
-
Proactive monitoring of system performance.
-
User feedback collection and analysis.
-
Continuous improvement of the configuration.
Support and Training:
-
Comprehensive user training programs.
-
Clear troubleshooting documentation.
-
Responsive support for authentication issues.
-
Regular communication about security benefits.