Chat now with support
Chat with Support

We are currently experiencing a OneLogin Outage within the US region, please consult https://www.onelogin.com/status for further details.

Safeguard Authentication Services 5.1.3 - macOS Administration Guide

Privileged Access Suite for UNIX Installation Safeguard Authentication Services macOS components Safeguard Authentication Services client configuration Special macOS features Limitations on macOS Group Policy for macOS Certificate Autoenrollment Glossary

Configuring Certificate Services Client - Auto-Enrollment Group Policy

If you are using Group Policy, you must enable Certificate Autoenrollment in Group Policy, otherwise, Group Policy may disable Certificate Autoenrollment. If you are not using Group Policy, Certificate Autoenrollment is enabled on each host by default.

To enable Certificate Autoenrollment using Group Policy

  1. On a domain controller running Windows Server 2008 R2 open the Start menu and navigate to Administrative Tools > Group Policy Management.

  2. In the console tree, double-click Group Policy Objects in the forest and domain containing the Group Policy Object (GPO) that you want to edit.

  3. Right-click the GPO, and click Edit.

  4. In the Group Policy Object Editor, navigate to User Configuration > Policies > Windows Settings > Security Settings and click Public Key Policies.

  5. Double-click Certificate Services Client - Auto-Enrollment.

  6. Next to Configuration Model, select Enabled from the drop-down list to enable autoenrollment.

  7. Click OK to accept your changes.

  8. In the Group Policy Object Editor, navigate to Computer Configuration > Policies > Windows Settings > Security Settings and click Public Key Policies.

  9. Repeat steps 5-7 for machine configuration.

Configuring Certificate Templates for autoenrollment

Certificate enrollment is based on templates which define the properties of certificates generated by the Certificate Authority (CA) when clients request certificates.

To create a new certificate template

  1. On the server hosting your Enterprise CA, click Start, select Administrative Tools, and click Certification Authority.

  2. In the console tree, expand the CA root node, select Certificate Templates, and click Manage.

  3. In the Certificate Templates console, select the template that you would like to enable for autoenrollment, or create a new template.

  4. Double-click the template to open its properties and select the Security tab.

  5. Add the users and machines that you want to automatically enroll for the certificate and select the Autoenroll permission option.

  6. Click Apply.

Using Certificate Autoenrollment

Certificate Autoenrollment is an automatic process that runs as-needed on client systems according to Group Policy or according to manual configuration if you are not using Group Policy. Certificate Autoenrollment typically requires no user interaction. After Certificate Autoenrollment is complete, certificates appear in the user's keychain for user-based enrollment or in the system keychain for machine-based enrollment.

Certificate Autoenrollment runs when:

  • A user logs in

  • Group Policy machine processing occurs (at machine startup and periodically thereafter)

  • vascert trigger runs manually (for machine-based enrollment)

If Group Policy is in use and a Certificate Services Client - Auto-Enrollment Group Policy indicates that Certificate Autoenrollment should occur, then the Certificate Autoenrollment client runs. The Certificate Autoenrollment client then downloads and evaluates Certificate Autoenrollment policy and uses this information to determine whether any certificates should be enrolled.

Each of these steps can be invoked manually for testing and troubleshooting. To start Group Policy manually, use the vgptool command. To run Certificate Autoenrollment, use the vascert command. These command are installed in /opt/quest/bin.

Configuring Certificate Autoenrollment manually

Once Certificate Autoenrollment is installed, you must configure your machine to use it. If you are using One Identity Safeguard Authentication Services with Group Policy, then skip the manual configuration described in this section as Group Policy performs these tasks automatically.

NOTE: Group Policy functionality is not available when used with the Apple Directory Services plug-in. When Group Policy is not available, you must manually configure certificate enrollment policy servers and schedule machine certificate enrollment to run on an interval if desired.

Related Topics

Configure a machine for Certificate Autoenrollment

Configure a user for Certificate Autoenrollment

Trigger machine-based Certificate Autoenrollment

Related Documents

The document was helpful.

Select Rating

I easily found the information I needed.

Select Rating