Skip to content

Latest commit

 

History

History
36 lines (23 loc) · 1.83 KB

AMA_Test.md

File metadata and controls

36 lines (23 loc) · 1.83 KB
layout title collection permalink
default
Authentication Mechanism Assurance
networkconfig
networkconfig/AMA/

Authentication Mechanism Assurance (AMA)

A high-level login risk, like logging into a government system from your favorite coffee shop, home, or the internet, means your system needs more stringent authentication mechanisms than for a low-risk logins (e.g., logging in at the office).

You can increase the protections for high-risk logins to sensitive federal resources by using Microsoft’s Windows Active Directory (AD) Domain Service’s (DS) Authentication Mechanism Assurance (AMA). AMA adds a group membership to a user’s security identifier attributes (SIDs).

Microsoft offers AMA with several Windows Server versions. Use these guidelines to configure your Windows Server.

Specific Implementations

Windows Server 2012® AD DS and Later

  • No patch is required. Enable AMA Priority above Most Recently Issued Superior Certificate Heuristic by using the Windows Registry Editor:

          [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\kdc]
          "ChainWithIssuancePolicyOIDs"=dword:00000001
    
  • The Power Shell Script below for the Federal Common and DoD Certificate Policies simplifies the Microsoft TechNet steps for the Windows Server 2012:
    https://github.com/GSA/piv-guides/files/621976/CertificateIssuanceOIDs.ps1.txt

Windows Server® 2008 R2 AD DS