1 Overview 1 .........................................................................................................................................................
2 Release notes 1 ..............................................................................................................................................
3 Requirements 3 ..............................................................................................................................................
3.1 Supported Operating Systems 3 ..............................................................................................................
3.2 Supported Web Browsers and Resolution 4 ...........................................................................................
3.3 Supported Web Applications 5 .................................................................................................................
3.4 Supported Mobile Phone Operating Systems 6 .....................................................................................
3.5 Installation Requirements 6 ......................................................................................................................
3.5.1 ESA components and OS compatibility 8 ............................................................................................................
3.6 Supported Active Directory Environments 9 ..........................................................................................
3.7 Firewall exceptions 10 ...............................................................................................................................
3.8 Policies 10 ....................................................................................................................................................
3.9 Handling cloned computers 11 .................................................................................................................
3.10 IP addresses used by ESET Secure Authentication 11 .......................................................................
4 Installation 12 ...................................................................................................................................................
4.1 Installation of Authentication Server 12 .................................................................................................
4.1.1 Custom proxy settings 15 ..............................................................................................................................
4.2 Installation of Reporting Engine (Elasticsearch) 15 ..............................................................................
4.3 Installation of the Remote Desktop plugin 17 .......................................................................................
4.4 Installation of the Web App plugin 18 .....................................................................................................
4.5 Installation of Windows Login plugin 19 .................................................................................................
4.6 Change, repair, remove installation 20 ...................................................................................................
4.7 Installation of Windows Login and RDP protection via GPO 21 ..........................................................
4.7.1 Startup script 22 .........................................................................................................................................
4.7.2 Software Installation task 24 ..........................................................................................................................
4.7.3 MSI arguments 32 .......................................................................................................................................
4.8 Upgrade installation 33 ..............................................................................................................................
4.8.1 Compatibility 35 ..........................................................................................................................................
5 Using reverse proxy 35 ...............................................................................................................................
5.1 Configure proxy for ESA 35 .......................................................................................................................
6 Geo located DNS support 37 ....................................................................................................................
7 Getting started with ESET Secure Authentication Web Console 38 ..................................
7.1 Activate ESET Secure Authentication 39 .................................................................................................
7.2 User Management - Provisioning 40 ........................................................................................................
7.2.1 User Status 43 ............................................................................................................................................
7.2.2 Synchronizing with LDAP 45 ...........................................................................................................................
7.2.3 Import users from file 46 ...............................................................................................................................
7.2.4 Self-enrollment 47 .......................................................................................................................................
7.3 Groups Based User Management 51 ........................................................................................................
7.4 Invitations 51 ...............................................................................................................................................
7.5 Use domain authentication 53 ..................................................................................................................
8 Authentication options 54 .........................................................................................................................
8.1 Mobile Application 54 .................................................................................................................................
8.2 Push Authentication 55 ..............................................................................................................................
8.3 Custom delivery options 60 .......................................................................................................................
8.3.1 Sample PowerShell scripts 63 .........................................................................................................................
8.4 Hard Tokens 65 ............................................................................................................................................
8.5 FIDO 68 .........................................................................................................................................................
9 Windows Login Protection 70 ..................................................................................................................
9.1 Master recovery key 73 ..............................................................................................................................
10 VPN Protection 74 ........................................................................................................................................
10.1 Configuration 75 .......................................................................................................................................