Authentication Mechanism Assurance

๐Ÿ”’ Secure Bits ๐Ÿ’ก
๐—ช๐—ฎ๐—ป๐˜ ๐˜๐—ผ ๐—ฒ๐—ป๐—ณ๐—ผ๐—ฟ๐—ฐ๐—ฒ ๐—ฟ๐—ผ๐—น๐—ฒ-๐—ฏ๐—ฎ๐˜€๐—ฒ๐—ฑ ๐—ฎ๐—ฐ๐—ฐ๐—ฒ๐˜€๐˜€ ๐—ฏ๐—ฎ๐˜€๐—ฒ๐—ฑ ๐—ผ๐—ป ๐—น๐—ผ๐—ด๐—ผ๐—ป ๐—บ๐—ฒ๐˜๐—ต๐—ผ๐—ฑโ€”๐—ป๐—ฎ๐˜๐—ถ๐˜ƒ๐—ฒ๐—น๐˜†?

Use ๐—”๐˜‚๐˜๐—ต๐—ฒ๐—ป๐˜๐—ถ๐—ฐ๐—ฎ๐˜๐—ถ๐—ผ๐—ป ๐— ๐—ฒ๐—ฐ๐—ต๐—ฎ๐—ป๐—ถ๐˜€๐—บ ๐—”๐˜€๐˜€๐˜‚๐—ฟ๐—ฎ๐—ป๐—ฐ๐—ฒ (๐—”๐— ๐—”) to give users different access based on how they authenticate.
๐Ÿชช Log on with smart card โ†’ โœ… get extra group membership
๐Ÿ”‘ Log on with password โ†’ โŒ no access to sensitive resources
Thatโ€™s the power of AMAโ€”built into Active Directory since 2008 R2.

๐—›๐—ฒ๐—ฟ๐—ฒโ€™๐˜€ ๐—ต๐—ผ๐˜„ ๐—ถ๐˜ ๐˜„๐—ผ๐—ฟ๐—ธ๐˜€:
1๏ธโƒฃ You create a custom Issuance Policy with a unique OID (e.g. 1.3.6.1.4.1.49955.5.1.1)
2๏ธโƒฃ You link it to an empty universal group
3๏ธโƒฃ You issue smart card certificates that embed this policy
4๏ธโƒฃ When a user logs on via smart card, the group SID is added to the Kerberos TGT
5๏ธโƒฃ Access to protected resources is now possibleโ€”only when logging in via certificate

And yes: theyโ€™re not a member of the group in ADโ€”but their TGT says otherwise.
Magic? ๐—ก๐—ผ. ๐—”๐— ๐—”.

๐Ÿงช Tested with YubiKey 5 NFC + smart card templates
๐Ÿ‘จโ€๐Ÿ’ป Admins use cert templates + issuance policy + certmgr.msc/YubiKey Manager
๐ŸŽฏ Resource access: SMB, SharePoint, MECM, etc.โ€”only when certificate-authenticated
โš ๏ธ Password logon = no group SID = no access
Tip: Don’t use Microsoftโ€™s built-in assurance levelsโ€”create your own OID instead.

๐—›๐—ฎ๐˜ƒ๐—ฒ ๐˜†๐—ผ๐˜‚ ๐—ฑ๐—ฒ๐—ฝ๐—น๐—ผ๐˜†๐—ฒ๐—ฑ ๐—”๐— ๐—” ๐—ถ๐—ป ๐—ฝ๐—ฟ๐—ผ๐—ฑ๐˜‚๐—ฐ๐˜๐—ถ๐—ผ๐—ป? Or planning passwordless access that adapts to auth type?๐Ÿ‘‡

Letโ€™s share best practices.

Author: Martin Handl โ€“ ๐—ณ๐˜‚๐—น๐—น ๐—ฎ๐—ฟ๐˜๐—ถ๐—ฐ๐—น๐—ฒ: https://iqunit.com/smartcard-logon-teil-2-ama/