Using SafeNet Authentication Client CBA For BitLocker
Using SafeNet Authentication Client CBA For BitLocker
Integration Guide
Description
SafeNet Authentication Client (SAC) is a public key infrastructure (PKI) middleware that provides a secure
method for exchanging information based on public key cryptography, enabling trusted third-party verification of
user identities. SAC enables the implementation of strong two-factor authentication using standard certificates,
as well as encryption and digital signing of data. The SAC generic integration with CAPI, CNG, and PKCS#11
security interfaces enables out-of-the-box interoperability with a variety of security applications, offering security
for web access, network logon, email, and data. PKI keys and certificates can be created, stored, and used
securely with the hardware or software tokens.
BitLocker (formerly BitLocker Drive Encryption) is a full-disk encryption feature included with the Ultimate and
Enterprise editions of Windows Vista and Windows 7, the Pro and Enterprise editions of Windows 8 and
Windows 8.1, and Windows Server 2008 and later. BitLocker protects data by providing encryption for entire
volumes. By default, BitLocker uses the AES encryption algorithm in cipher block chaining (CBC) mode with a
128-bit or 256-bit key, and can be combined with the Elephant diffuser for additional disk encryption-specific
security, which is not provided by AES. CBC is not used over the entire disk, but rather for each disk sector.
An effective strong authentication solution must be able to address data breaches on the rise for companies to
protect their information assets and comply with privacy regulations. Data encryption is a common technique
used by enterprises today, but to be most effective, it must be accompanied by strong two factor user
authentication to desktop, mobile, and laptop computer applications. Working together, encryption and
authentication reduce risk and stop unauthorized access to sensitive data.
SafeNet smart card certificate-based tokens and secure USB certificate-based tokens are interoperable with
BitLocker, providing a solution for encryption and strong access control that prevents unauthorized access to
sensitive data and stops information loss and exposure. The integrated solution delivers greater security,
reduced operational costs, and improved compliance by adding smart card-based strong user authentication to
BitLocker.
Gemalto’s X.509 certificate-based USB tokens and smart cards have been integrated with BitLocker, providing
two-factor authentication at both pre-boot and Microsoft Windows levels.
The Gemalto’s X.509 certificate-based USB tokens and smart cards provide secure storage for the certificates
needed for endpoint encryption for BitLocker functionality to boot up. If Gemalto’s X.509 certificate-based USB
token or smart card is not inserted in the client machine, or if the certificates are deleted, revoked, or expired,
the BitLocker software will not boot up and the data on the laptop will stay encrypted and secure.
This document provides guidelines for deploying certificate-based authentication (CBA) for user authentication
to BitLocker using Gemalto tokens or smart cards.
It is assumed that the BitLocker environment is already configured and working with static passwords prior to
implementing Gemalto multi-factor authentication.
BitLocker can be configured to support multi-factor authentication in several modes. CBA will be used for the
purpose of working with Gemalto products.
Environment
The integration environment that was used in this document is based on the following software versions:
SafeNet Authentication Client (SAC) Typical installation mode – 10.4
SafeNet Authentication Minidriver Package - 10.4
BitLocker – Windows 7, Windows 8.1, Windows 10 version1607.
Windows Server 2008R2 – Active Directory and Certificate management installed
Audience
This document is targeted to system administrators who are familiar with BitLocker, and are interested in adding
multi-factor authentication capabilities during pre-boot using SafeNet tokens.
Smart Cards
Gemalto IDPrime MD 830
Gemalto IDPrime MD 840
For a list of all supported devices please refer to SafeNet Authentication Client Customer Release Notes.
(The screen image above is from Microsoft Corporation®. Trademarks are the property of their respective owners).
3. Select Windows Components > BitLocker Drive Encryption.
(The screen image above is from Microsoft Corporation®. Trademarks are the property of their respective owners).
(The screen image above is from Microsoft Corporation®. Trademarks are the property of their respective owners).
(The screen image above is from Microsoft Corporation®. Trademarks are the property of their respective owners).
NOTE: The Smart Card Certificate contains the same Object identifier.
Windows 10
In this example Windows 10 Version 1607 is demonstrated.
1. Open My Computer.
2. Right-click the drive to be encrypted, and then select Turn on BitLocker.
(The screen image above is from Microsoft Corporation®. Trademarks are the property of their respective owners).
3. Connect the smart card or eToken containing the certificate.
(The screen image above is from Microsoft Corporation®. Trademarks are the property of their respective owners).
(The screen image above is from Microsoft Corporation®. Trademarks are the property of their respective owners).
(The screen image above is from Microsoft Corporation®. Trademarks are the property of their respective owners).
(The screen image above is from Microsoft Corporation®. Trademarks are the property of their respective owners).
(The screen image above is from Microsoft Corporation®. Trademarks are the property of their respective owners).
9. When encryption is complete, click Close.
(The screen image above is from Microsoft Corporation®. Trademarks are the property of their respective owners).
10. Restart the machine to activate locking of the encrypted drive.
(The screen image above is from Microsoft Corporation®. Trademarks are the property of their respective owners).
3. Connect the smart card or eToken containing the certificate.
4. On the BitLocker Drive Encryption window, select Use my smart card to unlock the drive, and then
click next.
(The screen image above is from Microsoft Corporation®. Trademarks are the property of their respective owners).
(The screen image above is from Microsoft Corporation®. Trademarks are the property of their respective owners).
(The screen image above is from Microsoft Corporation®. Trademarks are the property of their respective owners).
(The screen image above is from Microsoft Corporation®. Trademarks are the property of their respective owners).
8. When encryption is complete, click Close.
(The screen image above is from Microsoft Corporation®. Trademarks are the property of their respective owners).
9. Restart the machine to activate locking of the encrypted drive.
(The screen image above is from Microsoft Corporation®. Trademarks are the property of their respective owners).
3. Connect the smart card or eToken containing the certificate.
(The screen image above is from Microsoft Corporation®. Trademarks are the property of their respective owners).
5. When the Insert Smart Card window opens, click Cancel
(The screen image above is from Microsoft Corporation®. Trademarks are the property of their respective owners).
6. Select one of the following methods for the recovery key, and then click Next:
Save the recovery key to a file - saves the key as a file in a folder on another drive on your computer
that will not be encrypted.
Print the recovery key - prints a hard copy of the recovery key.
(The screen image above is from Microsoft Corporation®. Trademarks are the property of their respective owners).
(The screen image above is from Microsoft Corporation®. Trademarks are the property of their respective owners).
8. When encryption is complete, click Close.
(The screen image above is from Microsoft Corporation®. Trademarks are the property of their respective owners).
9. Restart the machine to activate locking of the encrypted drive.
(The screen image above is from Microsoft Corporation®. Trademarks are the property of their respective owners).
(The screen image above is from Microsoft Corporation®. Trademarks are the property of their respective owners).
4. On the Token Logon window (SafeNet Authentication Client or SafeNet Minidriver Package), enter the
eToken password or PIN in the Token Password field, and then click OK.
SafeNet Authentication Client
(The screen image above is from Microsoft Corporation®. Trademarks are the property of their respective owners).
If the credentials are valid, the contents of the drive are displayed.
(The screen image above is from Microsoft Corporation®. Trademarks are the property of their respective owners).
(The screen image above is from Microsoft Corporation®. Trademarks are the property of their respective owners).
3. Connect the smart card or eToken to the machine, and then click Unlock.
(The screen image above is from Microsoft Corporation®. Trademarks are the property of their respective owners).
(The screen image above is from Microsoft Corporation®. Trademarks are the property of their respective owners).
NOTE: When backwardly compatible IDGo 800 is installed, the Insert Smart
Card prompt does not appear. Just click Next.
5. On the Token Logon window (SafeNet Authentication Client or SafeNet Minidriver Package), enter the
eToken password or PIN in the Token Password field, and then click OK.
SafeNet Authentication Client
(The screen image above is from Microsoft Corporation®. Trademarks are the property of their respective owners).
If the credentials are valid, the contents of the drive are displayed.
(The screen image above is from Microsoft Corporation®. Trademarks are the property of their respective owners).
(The screen image above is from Microsoft Corporation®. Trademarks are the property of their respective owners).
(The screen image above is from Microsoft Corporation®. Trademarks are the property of their respective owners).
4. Select Create a new certificate, and then click Next.
(The screen image above is from Microsoft Corporation®. Trademarks are the property of their respective owners).
5. Connect the Token/Smart Card
(The screen image above is from Microsoft Corporation®. Trademarks are the property of their respective owners).
7. On the Token Logon window (SafeNet Authentication Client or SafeNet Minidriver Package), enter the
eToken password or PIN in the Token Password field, and then click OK.
SafeNet Authentication Client
(The screen image above is from Microsoft Corporation®. Trademarks are the property of their respective owners).
A self-signed certificate will be generated on the eToken
(The screen image above is from Microsoft Corporation®. Trademarks are the property of their respective owners).
(The screen image above is from Microsoft Corporation®. Trademarks are the property of their respective owners).
(The screen image above is from Microsoft Corporation®. Trademarks are the property of their respective owners).
The wizard confirms the creation of the certificate.
10. Click Close to exit the wizard
(The screen image above is from Microsoft Corporation®. Trademarks are the property of their respective owners).
(The screen image above is from Microsoft Corporation®. Trademarks are the property of their respective owners).
3. Select Windows Components > BitLocker Drive Encryption.
(The screen image above is from Microsoft Corporation®. Trademarks are the property of their respective owners).
(The screen image above is from Microsoft Corporation®. Trademarks are the property of their respective owners).
(The screen image above is from Microsoft Corporation®. Trademarks are the property of their respective owners).
(The screen image above is from Microsoft Corporation®. Trademarks are the property of their respective owners).
2. Browse to HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft, and then right-click Microsoft.
(The screen image above is from Microsoft Corporation®. Trademarks are the property of their respective owners).
(The screen image above is from Microsoft Corporation®. Trademarks are the property of their respective owners).
4. Right-click FVE.
5. Select New > DWORD (32-bit) Value, name the value SelfSignedCertificates, and then enter a value of 1.
(The screen image above is from Microsoft Corporation®. Trademarks are the property of their respective owners).
6. Close the Registry Editor.
NOTE: You require an account to access the Customer Support Portal. To create
a new account, go to the portal and click on the REGISTER link.
Telephone Support
If you have an urgent problem, or cannot access the Customer Support Portal, you can contact Customer
Support by telephone. Calls to Customer Support are handled on a priority basis.
Global +1-410-931-7520
Australia 1800.020.183
France 0800-912-857
Germany 0800-181-6374
India 000.800.100.4290
Israel 180-931-5798
Italy 800-786-421
Netherlands 0800.022.2996
Portugal 800.863.499
Singapore 800.1302.029
Spain 900.938.717
Sweden 020.791.028
Switzerland 0800.564.849