KB001: Configure FIDO Login Support for Workspace Client
Last Updated: July 30, 2025
Applies To: Accops Workspace Windows Client 7.2.0.1040 and above
Category: Security & Access Control
Feature Status: Stable
Overview
This guide explains how to configure FIDO-based second-factor authentication for Accops Workspace Windows Client. This feature enables users to authenticate using Windows Hello (PIN, fingerprint) or FIDO2-compliant security keys after password entry. FIDO authentication provides enhanced security through strong second-layer authentication that reduces credential-based attacks and meets regulatory compliance requirements.
Prerequisites
- Gateway Version: HySecure Gateway 5.4 SP6 or HySecure Gateway 7.0 and above.
- Client Version: Accops Workspace Windows Client 7.2.0.1040 or higher.
- Administrative Access: Security Officer or Administrator access to HySecure Management Console.
- Windows Configuration: Windows PIN or Biometric settings activated on endpoint device.
- Network Connectivity: HTTPS connectivity between client and HySecure Gateway.
- Knowledge Requirement: Understanding of HyID policy configuration and multi-factor authentication concepts.
Benefits
- Enhanced Security: Strong second-layer authentication significantly reduces credential-based attacks and unauthorized access attempts.
- Regulatory Compliance: Meets multi-factor authentication requirements for HIPAA, SOX, PCI-DSS, and other regulatory standards.
- Improved User Experience: Seamless biometric authentication eliminates complex token management and reduces password dependency.
- Passwordless Foundation: Establishes infrastructure for transitioning to passwordless authentication models in future implementations.
FIDO Authentication Methods
Windows Hello Integration
- Description: Native Windows biometric authentication using PIN, fingerprint, or facial recognition.
- Use Case: Ideal for corporate-managed Windows devices with built-in biometric sensors.
- Requirements: Windows 10/11 with Windows Hello configured and active.
FIDO2 Security Keys
- Description: Hardware-based authentication tokens supporting FIDO2/WebAuthn standards.
- Use Case: Suitable for high-security environments requiring physical authentication tokens.
- Requirements: FIDO2-compliant hardware keys (YubiKey, Microsoft Security Key, etc.).
Platform Support
Client Mode | Windows 8/8.1 | Windows 10/11 | Server 2016-2025 | Support Level |
---|---|---|---|---|
Full Admin Client | Yes | Yes | Yes | Full Support |
HyBrid Mode | Yes | Yes | Yes | Full Support |
HyLite Mode | Yes | Yes | Yes | Full Support |
On-Demand Client | Yes | Yes | Yes | Full Support |
Procedure Part 1: Gateway Configuration
Step 1: Create HyID Policy with FIDO Token
- Access Management Console
- Login to HySecure Management Console as Security Officer or Administrator.
-
Navigate to Policies > HyID Policies section.
-
Create New HyID Policy
- Click Add or Create New Policy button.
- Enter policy name (e.g., "FIDO-Authentication-Policy").
-
Set policy description: "FIDO-based second-factor authentication policy".
-
Configure FIDO Token Settings
- In the Authentication Methods section, enable FIDO Token.
- Set Authentication Type to Second Factor Authentication.
- Configure Token Validity Period (recommended: 30 days).
- Enable Device Registration Required for first-time users.
[IMAGE PLACEHOLDER: HyID Policy FIDO token configuration interface]
Step 2: Configure Gateway Hostname Settings
- Navigate to Site Configuration
- Go to Management Console > Sites > [Your Site Name].
-
Locate the "Public IP Address and Port" field.
-
Set Gateway Hostname
- Critical Requirement: Specify Gateway Address as hostname (not IP address).
- Example:
gateway.company.com:443
instead of192.168.1.100:443
. -
This hostname configuration is required for FIDO authentication to function properly.
-
Verify DNS Resolution
- Ensure the hostname resolves correctly from client devices
- Test DNS resolution:
nslookup gateway.company.com
- Confirm SSL certificate matches the configured hostname
[IMAGE PLACEHOLDER: Site configuration with hostname setting]
Step 3: Assign HyID Policy to Users
- User Policy Assignment
- Navigate to Users → [Username] → Policies
- Assign the created FIDO HyID policy to target users
-
Set policy priority if multiple authentication policies exist
-
Group Policy Assignment (Alternative)
- Navigate to Groups → [Group Name] → Policies
- Assign FIDO policy to user groups for bulk deployment
- Verify policy inheritance for group members
Procedure Part 2: Client Device Configuration
Step 1: Configure Windows Authentication Methods
- Enable Windows PIN
- Navigate to Windows Settings → Accounts → Sign-in Options
- Click PIN (Windows Hello) section
- Click Set up and follow the PIN creation wizard
-
Create a minimum 6-digit PIN following organizational policy
-
Enable Biometric Authentication (If Available)
- In Sign-in Options, locate Fingerprint (Windows Hello) or Face (Windows Hello)
- Click Set up for available biometric methods
- Complete biometric enrollment following on-screen prompts
-
Test biometric authentication functionality
-
Verify Windows Hello Status
- Confirm "Windows Hello is ready to use" message appears
- Test Windows Hello authentication with Windows lock screen
- Ensure biometric sensors function correctly
[IMAGE PLACEHOLDER: Windows Hello configuration interface]
Step 2: Install FIDO2 Security Key** (If Using Hardware Tokens)
- Hardware Key Setup
- Insert FIDO2-compliant security key into USB port
- Navigate to Windows Settings → Accounts → Sign-in Options
-
Click Security Key section and select Set up
-
Key Registration Process
- Follow Windows prompts to register security key
- Create key PIN when prompted (different from Windows PIN)
-
Test security key functionality with Windows authentication
-
Verify Key Recognition
- Confirm security key appears in Windows Hello devices
- Test key responsiveness and LED indicators
- Ensure key firmware is updated to latest version
Configuration Examples
Example 1: Corporate Environment with Windows Hello
Configuration:
- HyID Policy: FIDO-Corporate-Policy
- Authentication Method: Windows Hello PIN + Fingerprint
- Gateway Hostname: vpn.corporation.com
- Token Validity: 30 days
- Registration Mode: User self-registration on first login
Use Case: Standard corporate deployment with company-managed Windows 10/11 devices equipped with fingerprint sensors Benefits: Seamless user experience with strong biometric authentication and centralized policy management
Example 2: High-Security Environment with Hardware Tokens
Configuration:
- HyID Policy: FIDO-HighSecurity-Policy
- Authentication Method: YubiKey 5 Series FIDO2 token
- Gateway Hostname: secure-gateway.organization.gov
- Token Validity: 7 days (shorter for high-security)
- Registration Mode: Administrator-assisted registration
Use Case: Government, financial, or healthcare environments requiring hardware-based authentication Benefits: Maximum security with tamper-resistant hardware tokens and strict validation policies
Example 3: Mixed Environment with Multiple Methods
Configuration:
- HyID Policy: FIDO-Flexible-Policy
- Authentication Method: Windows Hello PIN, Fingerprint, and Security Key options
- Gateway Hostname: remote.company.org
- Token Validity: 14 days
- Registration Mode: User choice during registration
Use Case: Diverse user base with varying device capabilities and security requirements Benefits: Flexibility for users while maintaining consistent security standards across organization
FIDO Registration Process
First-Time User Registration
Registration Workflow:
- Initial Authentication: User provides username and password credentials
- 2FA Selection: User selects FIDO token from available second-factor options
- Registration Redirect: System redirects to HyLite registration interface
- Method Selection: User chooses from available FIDO methods:
- Windows PIN authentication
- Biometric authentication (fingerprint/face)
- Hardware security key
- Device Binding: Selected method binds to user account and device
- Registration Completion: Confirmation message indicates successful registration
Registration Security:
- Device binding prevents cross-device token reuse
- Cryptographic key pairs generated during registration
- Private keys stored securely on device/hardware token
- Public keys registered with HySecure Gateway
Multi-Device Registration
Device Management:
- Users can register multiple devices with same account
- Each device maintains separate FIDO credentials
- Administrative visibility into registered devices per user
- Capability to revoke individual device registrations
Verification and Testing
Functional Testing
- First-Time Registration Test
- Create test user with FIDO policy assignment
- Perform initial login and complete FIDO registration
- Verify registration success and token binding
-
Expected Result: User successfully registers FIDO method and completes authentication
-
Subsequent Authentication Test
- Logout test user and perform second login attempt
- Verify FIDO authentication prompt appears
- Complete authentication using registered method
-
Expected Result: User authenticates successfully without re-registration
-
Multiple Method Test
- Register multiple FIDO methods for single user (PIN + fingerprint)
- Test authentication using each registered method
- Verify method selection interface functionality
- Expected Result: All registered methods function correctly
Integration Testing
-
Cross-Platform Compatibility Test
- Test FIDO authentication across different client modes
- Verify functionality on various Windows versions
- Test with different hardware configurations
- Expected Result: Consistent functionality across supported platforms
-
Network Connectivity Test
-
Test FIDO authentication over various network conditions
- Verify functionality through corporate firewalls and proxies
- Test with network interruptions during authentication
- Expected Result: Robust authentication under network constraints
Monitoring and Logging
Authentication Event Logging:
- Successful FIDO authentications: User, timestamp, method used, device identifier
- Failed authentication attempts: User, failure reason, timestamp, source IP
- Registration events: New device registrations, method changes, token binding
- Administrative actions: Policy changes, user assignments, device revocations
Log Analysis:
- Navigate to HySecure Management Console > Monitoring > Authentication Logs
- Filter by Authentication Type: FIDO for FIDO-specific events
- Monitor authentication success rates and failure patterns
- Review registration trends and device proliferation
Performance Metrics:
- Average authentication time for FIDO methods
- Registration completion rates
- User adoption statistics
- Support ticket volume related to FIDO authentication
Security Considerations
Device Security
Endpoint Protection:
- Windows Hello Security: Biometric data stored locally in Trusted Platform Module (TPM)
- Hardware Token Security: Private keys never leave FIDO2 security device
- Anti-Tampering: Hardware tokens include tamper detection and resistance
- Cryptographic Standards: FIDO2/WebAuthn compliance ensures industry-standard security
Access Control:
- Device registration limited to authorized users with valid initial credentials
- Administrative capability to revoke device registrations remotely
- Policy-based control over acceptable FIDO authentication methods
- Integration with existing identity and access management systems
Network Security
Communication Protection:
- All FIDO authentication communications encrypted using TLS 1.2 or higher
- Certificate validation ensures secure communication channels
- Protection against man-in-the-middle attacks through certificate pinning
- Network traffic analysis capabilities for authentication monitoring
Privacy Protection:
- Biometric data never transmitted over network
- FIDO tokens generate unique key pairs per service
- No cross-service tracking or correlation capabilities
- Compliance with privacy regulations (GDPR, CCPA, etc.)
Troubleshooting
Common Issues:
FIDO Registration Fails:
- Issue: User cannot complete FIDO token registration during first login
- Check: Verify Windows Hello is properly configured and functional on endpoint device
- Verify: Confirm HyID policy includes FIDO token configuration and is assigned to user
- Solution: Reset Windows Hello settings and re-enable PIN/biometric authentication
- Prevention: Provide users with Windows Hello configuration guide before FIDO deployment
Authentication Prompt Not Appearing:
- Issue: FIDO authentication prompt does not appear during login process
- Check: Verify gateway hostname is configured correctly (not IP address)
- Verify: Confirm DNS resolution of gateway hostname from client device
- Solution: Update gateway configuration to use FQDN instead of IP address
- Prevention: Implement DNS monitoring and certificate management procedures
Hardware Token Not Recognized:
- Issue: FIDO2 security key not detected by Windows or client application
- Check: Verify security key is FIDO2/WebAuthn compliant and properly inserted
- Verify: Confirm latest Windows updates and security key firmware installed
- Solution: Update security key firmware and reinstall Windows Hello security key configuration
- Prevention: Maintain inventory of approved security key models and firmware versions
Cross-Device Authentication Issues:
- Issue: FIDO authentication fails when user switches to different device
- Check: Verify user understands device-specific nature of FIDO registration
- Verify: Confirm user has completed registration process on current device
- Solution: Complete FIDO registration process on each device user intends to use
- Prevention: User training on FIDO device binding concepts and multi-device workflows
Diagnostic Steps
Registration Diagnostics:
# Windows Hello Status Check
Get-WindowsHelloPIN
Get-WindowsHelloFingerprint
Get-WindowsHelloFace
Network Connectivity Diagnostics:
- DNS Resolution Test:
nslookup [gateway-hostname]
- HTTPS Connectivity Test:
Test-NetConnection [gateway-hostname] -Port 443
- Certificate Validation: Browser certificate inspection for gateway hostname
- Network Path Analysis:
tracert [gateway-hostname]
for routing verification
Authentication Flow Analysis:
- Review HySecure authentication logs for FIDO-specific entries
- Analyze client-side logs for registration and authentication events
- Monitor network traffic during FIDO authentication process
- Verify policy application and user assignment through management console
Advanced Configuration
Policy Customization
Advanced FIDO Policy Settings:
- Token Timeout Configuration: Customize authentication validity periods
- Method Restrictions: Limit acceptable FIDO methods per user group
- Device Limits: Configure maximum registered devices per user
- Fallback Options: Define alternative authentication methods if FIDO fails
Integration with Existing Policies:
- Combine FIDO authentication with existing password policies
- Integrate with certificate-based authentication workflows
- Configure conditional access based on device compliance status
- Establish risk-based authentication triggers
Note
- Device Binding: FIDO registrations are specific to individual devices and cannot be transferred between devices.
- Backup Authentication: Ensure alternative authentication methods remain available during FIDO implementation.
- User Training: Provide comprehensive user training on FIDO registration and authentication procedures.
- Support Preparation: Prepare technical support team for FIDO-related user assistance and troubleshooting.
Contact Support: support@accops.com for FIDO Login Support configuration assistance