Export (0) Print
Expand All
Expand Minimize

Enable-DAOtpAuthentication

Updated: August 15, 2012

Applies To: Windows Server 2012

Enable-DAOtpAuthentication

Enables and configures one-time password (OTP) authentication for DirectAccess (DA) users.

Syntax

Parameter Set: Enable1
Enable-DAOtpAuthentication [-AsJob] [-CAServer <String[]> ] [-CertificateTemplateName <String> ] [-CimSession <CimSession[]> ] [-ComputerName <String> ] [-Force] [-PassThru] [-RadiusPort <UInt16> ] [-RadiusServer <String> ] [-SharedSecret <String> ] [-SigningCertificateTemplateName <String> ] [-ThrottleLimit <Int32> ] [-UserSecurityGroupName <String> ] [-Confirm] [-WhatIf] [ <CommonParameters>]




Detailed Description

The Enable-DAOtpAuthentication cmdlet enables one-time password (OTP) authentication for DirectAccess (DA) users, and configures OTP settings.

Parameters

-AsJob

Runs the cmdlet as a background job. Use this parameter to run commands that take a long time to complete. The cmdlet immediately returns an object that represents the job and then displays the command prompt. You can continue to work in the session while the job completes. To manage the job, use the *-Job cmdlets. To get the job results, use the Receive-Job cmdlet. For more information about Windows PowerShell® background jobs, see about_Jobs.


Aliases

none

Required?

false

Position?

named

Default Value

none

Accept Pipeline Input?

false

Accept Wildcard Characters?

false

-CAServer<String[]>

Specifies the certification authority (CA) servers that issue certificates for OTP authentication. Specify a server in the following format:
-- CAServer_Name\CAService_Name.


Aliases

none

Required?

false

Position?

named

Default Value

none

Accept Pipeline Input?

True (ByPropertyName)

Accept Wildcard Characters?

false

-CertificateTemplateName<String>

Specifies the name of the certificate template used for OTP certificate enrollment.


Aliases

none

Required?

false

Position?

named

Default Value

none

Accept Pipeline Input?

True (ByPropertyName)

Accept Wildcard Characters?

false

-CimSession<CimSession[]>

Runs the cmdlet in a remote session or on a remote computer. Enter a computer name or a session object, such as the output of a New-CimSession or Get-CimSession cmdlet. The default is the current session on the local computer.


Aliases

Session

Required?

false

Position?

named

Default Value

none

Accept Pipeline Input?

false

Accept Wildcard Characters?

false

-ComputerName<String>

Specifies the IPv4 or IPv6 address, or host name, of the server on which the cmdlet should run.


Aliases

Cn

Required?

false

Position?

named

Default Value

none

Accept Pipeline Input?

false

Accept Wildcard Characters?

false

-Force

Forces the command to run without asking for user confirmation.


Aliases

none

Required?

false

Position?

named

Default Value

none

Accept Pipeline Input?

false

Accept Wildcard Characters?

false

-PassThru

Returns an object representing the item with which you are working. By default, this cmdlet does not generate any output.


Aliases

none

Required?

false

Position?

named

Default Value

none

Accept Pipeline Input?

false

Accept Wildcard Characters?

false

-RadiusPort<UInt16>

Specifies the RADIUS server port listening for authentication requests.


Aliases

Port

Required?

false

Position?

named

Default Value

none

Accept Pipeline Input?

True (ByPropertyName)

Accept Wildcard Characters?

false

-RadiusServer<String>

Specifies the IPv4 or IPv6 address, or the fully qualified domain name (FQDN), of the RADIUS server used for OTP authentication.


Aliases

Server

Required?

false

Position?

named

Default Value

none

Accept Pipeline Input?

True (ByPropertyName)

Accept Wildcard Characters?

false

-SharedSecret<String>

Specifies the shared password used for communications between the Remote Access server and the RADIUS server.


Aliases

none

Required?

false

Position?

named

Default Value

none

Accept Pipeline Input?

True (ByPropertyName)

Accept Wildcard Characters?

false

-SigningCertificateTemplateName<String>

Specifies the name of the certificate template used to enroll the certificate used by Remote Access to sign certificates used for OTP authentication.


Aliases

none

Required?

false

Position?

named

Default Value

none

Accept Pipeline Input?

True (ByPropertyName)

Accept Wildcard Characters?

false

-ThrottleLimit<Int32>

Specifies the maximum number of concurrent operations that can be established to run the cmdlet. If this parameter is omitted or a value of 0 is entered, then Windows PowerShell® calculates an optimum throttle limit for the cmdlet based on the number of CIM cmdlets that are running on the computer. The throttle limit applies only to the current cmdlet, not to the session or to the computer.


Aliases

none

Required?

false

Position?

named

Default Value

none

Accept Pipeline Input?

false

Accept Wildcard Characters?

false

-UserSecurityGroupName<String>

Specifies the security group containing users who are exempt from two-factor authentication.


Aliases

none

Required?

false

Position?

named

Default Value

none

Accept Pipeline Input?

True (ByPropertyName)

Accept Wildcard Characters?

false

-Confirm

Prompts you for confirmation before running the cmdlet.


Required?

false

Position?

named

Default Value

false

Accept Pipeline Input?

false

Accept Wildcard Characters?

false

-WhatIf

Shows what would happen if the cmdlet runs. The cmdlet is not run.


Required?

false

Position?

named

Default Value

false

Accept Pipeline Input?

false

Accept Wildcard Characters?

false

<CommonParameters>

This cmdlet supports the common parameters: -Verbose, -Debug, -ErrorAction, -ErrorVariable, -OutBuffer, and -OutVariable. For more information, see    about_CommonParameters.

Inputs

The input type is the type of the objects that you can pipe to the cmdlet.

  • None

Outputs

The output type is the type of the objects that the cmdlet emits.

  • Microsoft.Management.Infrastructure.CimInstance#DAOtpAuth

    The Microsoft.Management.Infrastructure.CimInstance object is a wrapper class that displays Windows Management Instrumentation (WMI) objects. The path after the pound sign (#) provides the namespace and class name for the underlying WMI object.
    The object contains the following OTP authentication configuration settings:
    -- OtpStatus specifies whether OTP authentication is enabled or disabled.
    -- RadiusServer specifies OTP RADIUS server names and addresses.
    -- UserSecurityGroupName specifies security group of users exempt from two-factor authentication.
    -- CAServer specifies the CA servers used for OTP authentication.
    -- CertificateTemplateName specifies the name of the OTP certificate template.
    -- SigningCertificateTemplateName specifies the name of the certificate template used to enroll the certificate used by Remote Access to sign certificates used for OTP authentication.


Examples

Example 1

This example enables OTP authentication for DA users while setting the following.
-- rsa.corp.contoso.com as RADIUS or OTP server used to verify users OTP credentials.
-- dc1.corp.contoso.com\corp-DC1-CA as CA server used to enroll smart card logon short lived certificates.
-- DAOTPLogon as enroll smart card logon short lived certificates template.
All of the above settings should be set up in advance before the DA administrator can configure OTP for DA. UserSecurityGroupName is an optional setting and thus was not set which means that the two-factor authentication exemption feature is Disabled.
This cmdlet can add one new OTP Radius server each time it runs, for additional handling of Radius servers for OTP please use RemoteAccessRadius cmdlets.
Note: This cmdlet will enable OTP if two-factor user authentication and computer certificates were already enabled using the Set-DAServer cmdlet. If PKI and two-factor user authentication are disabled, then this cmdlet fails. In addition enabling OTP authentication does not disable smart card or any other two-factor authentication available to the DA user.


 

PS C:\> Enable-DAOtpAuthentication –RadiusServer rsa.corp.contoso.com –SharedSecret abcd123$ -CAServers dc1.corp.contoso.com\corp-DC1-CA –CertificateTemplateName DAOTPLogon –PassThru -Force
OtpStatus               : Enabled 
CAServers               : {dc1.corp.contoso.com\corp-DC1-CA} 
CertificateTemplateName : DAOTPLogon 
RadiusServer            : {rsa.corp.contoso.com} 
UserSecuriotyGroupName  : 

 

If the Force parameter is not used, then the DA administrator is presented with the following prompt.


PS C:\> Enable-DAOtpAuthentication –RadiusServer rsa.corp.contoso.com –SharedSecret abcd123$ -CAServers dc1.corp.contoso.com\corp-DC1-CA –CertificateTemplateName DAOTPLogon –PassThru
OtpStatus               : Enabled 
CAServers               : {dc1.corp.contoso.com\corp-DC1-CA} 
CertificateTemplateName : DAOTPLogon 
RadiusServer            : {rsa.corp.contoso.com} 
UserSecuriotyGroupName  : 
 
Enabling OTP authentication will change DirectAccess user authentication settings. Do you want to continue? 
[Y] Yes  [N] No  [S] Suspend  [?] Help  (default is "Y"): 

Example 2

This example enables OTP authentication for DA users while keeping the OTP settings for RadiusServer and CAServers that were set before OTP authentication was disabled. The CertificateTemplateName setting was updated to the new value.
The new smart card logon short lived certificates template should be created before running this cmdlet.


PS C:\> Enable-DAOtpAuthentication -CertificateTemplateName DAOTPLogon_v2 –PassThru -Force
OtpStatus               : Enabled 
CAServers               : {dc1.corp.contoso.com\corp-DC1-CA} 
CertificateTemplateName : DAOTPLogon_v2 
RadiusServer            : {rsa.corp.contoso.com} 
UserSecuriotyGroupName  : 

Related topics

Was this page helpful?
(1500 characters remaining)
Thank you for your feedback
Show:
© 2014 Microsoft