- 02 Dec 2024
- 2 Minutes to read
- Print
- DarkLight
- PDF
AirLock Enforcement Logic
- Updated on 02 Dec 2024
- 2 Minutes to read
- Print
- DarkLight
- PDF
When using Axiad AirLock, you can redirect your users to the Unified Portal to enroll or update authentication credentials, or you can block them entirely from access based on a set of criteria.
Default Enforcement
Below are the default criteria for when the Axiad AirLock will direct the user to the Unified Portal:
If a user signs in via their Windows password (temporary or permanent).
If a user signs in with a PKI-capable MFA device whose certificates expire within a mandatory renewal period.
If a user signs in with a PKI-capable MFA device whose certificates expire within an optional renewal period.
In this case, the user is offered the opportunity to enter the Unified Portal to renew their certificate, but they will not be forced into it until they reach the mandatory renewal period.
If a user signs in with an allowed authentication method (methods configurable)
Default methods include:
Axiad ID Winlogon provider
Windows Hello PIN
Windows Hello Facial Recognition
Windows Hello Fingerprint
Windows Hello Trusted Signal
While in the secured Unified Portal kiosk, the following enforcements are in place:
No window controls.
No desktop windowing environment.
No Windows keyboard shortcuts (including CTRL-ALT-DEL, Windows Key, and others).
Exceptions
Some exceptions can be configured to where a user is either allowed in or blocked rather than redirected to the Unified Portal:
If the user is an administrator (or another protected role SID to SID list).
If the user is not one of a specific list of SIDs.
If the user signs in with a non-domain user (local to the machine only).
If the user signs in while the Unified Portal is unreachable.
If the user signs in with an allowed authenticator.
AirLock Enforcement Flow
Note
The AirLock enforcement flow is completely customizable, so your environment may not have the same checks as you see below based on your settings.
In Axiad AirLock 2.4+, the enforcement flow is as follows:
User attempts a login on their Windows machine
AirLock checks the user’s group information
If the user is not part of a bypass group, then Axiad looks at the user ID information
If the user ID is not part of a bypass list, then Axiad checks the certificates on ANY inserted smartcard
Regardless of the smartcard / authentication device being used, Axiad checks all inserted devices for certificate expiration
If a certificate on any of the inserted smartcards is within the renewal window, then the user is redirected to the Unified Portal kiosk to update their device
If the certificates are all valid (or the user does not have any smartcards inserted), then Axiad looks at the authenticator that the user employed to log into the machine
If the authenticator is not an acceptable authenticator (either via the authenticator bypass or required authentication type rules), then the user is redirected to the Unified Portal kiosk to enroll a suitable authenticator for their next login attempt
If the authenticator is acceptable, then the user is securely logged into their machine
If the user is redirected to the Unified Portal kiosk, then they have the opportunity to log in again once they have resolved their issue and successfully authenticate
Learn More
Learn how to configure AirLock policies and see some real examples that expand beyond the default enforcement here.