Network Security: Allow PKU2U authentication requests to this computer to use online identitiesID: oval:org.secpod.oval:def:35243 | Date: (C)2016-06-10 (M)2023-12-13 |
Class: COMPLIANCE | Family: windows |
This policy will be turned off by default on domain joined machines. This would prevent online identities from authenticating to the domain joined machine.
Windows 7 and Windows Server 2008 R2 introduce an extension to the Negotiate authentication package, Spnego.dll. In previous versions of Windows, Negotiate decides whether to use Kerberos or NTLM for authentication. The extension SSP for Negotiate, Negoexts, which is treated as an authentication protocol by Windows, supports Microsoft SSPs including PKU2U. You can also develop or add other SSPs.
When computers are configured to accept authentication requests by using online IDs, Negoexts.dll calls the PKU2U SSP on the computer that is used to log on. The PKU2U SSP obtains a local certificate and exchanges the policy between the peer computers. When validated on the peer computer, the certificate within the metadata is sent to the logon peer for validation and associates the user's certificate to a security token and the logon process completes.
Counter Measure:
Configure Network Security: Allow PKU2U authentication requests to this computer to use online identities to disabled.
Potential Impact:
Disabling this setting will disallow the online identities to be able to authenticate to the domain joined machine in Windows 7.
Fix:
(1) GPO: Computer Configuration\Windows Settings\Security Settings\Local Policies\Security Options\Network Security: Allow PKU2U authentication requests to this computer to use online identities
(2) REG: HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Lsa\pku2u!AllowOnlineID
Platform: |
Microsoft Windows 10 |