diff --git a/_implement/scl-windows.md b/_implement/scl-windows.md index 6fe4e786..0ba3da70 100644 --- a/_implement/scl-windows.md +++ b/_implement/scl-windows.md @@ -33,21 +33,15 @@ subnav:
- The Microsoft KB mentioned above is updated. Note that the "disabled" mode retirement is still targeted at 2/14/23. CISA encourages any agency still reliant on "disabled" mode to move to "compatibility mode" by following the CISA Guidance as soon as possible while a timeline and plans around long term resolution of this issue is finalized with Microsoft. Additional technical guidance can be requested through cyberlaison at CISA dot DHS dot gov. + As of September 10th 2024, Microsoft has released a solution for Active Directory network authentication issues resulting from the May 2022 patches that impacted some PIV network authentications. The September patch applies to Windows Server 2019 and later and includes a mechanism for support of some deprecated identifiers asserted by PIV authentication certificates (e.g., UPN or X509IssuerSubject altsecid) and mapped to AD user accounts. AD administrators now have the ability to add registry keys that include what is being termed a "Triple Mapping" or "Policy Tuple" that allows the domain controller to determine if an authentication certificate is issued from a trusted Certification Authority (CA) and if it asserts an acceptable policy OID before defining acceptable identifiers for user account mapping. You can read more about these AD changes in the following Microsoft Public Sector Blog. Full enforcement mode for use of approved identifiers is still planned to go into effect on February 11, 2025 and compatibility mode will be fully retired on September 10th, 2025. See Step 4 below regarding Account Linking for further details.
- Some PIV-based authentication to Microsoft Domain Controllers are impacted by May 2022 Windows server patches. If you encounter these PIV network logon issues, please review the CISA Guidance which is supported by the following KB5014754—Certificate-based authentication changes on Windows domain controllers page. Additional technical guidance can be requested through cyberlaison at CISA dot DHS dot gov. -
-+ You can find end-entity CRL Distrobution Point and OCSP URIs under our Active PIV Issuing CA page in the event you require revocation information for externally issued PIV CAs. +
++ Vulnerabilities identified in CVEs reported in May 2022 have outlined potential avenues for network authentication based on spoofed or emulated device certificates that have not been issued by trusted CAs. In order to avoid these vulnerabilities, AD implmenters must prohibit the use of any non-person entity (NPE or Devices to include DCs) certificates issued by CAs listed in GPO policy tuples. Please see the following Microsoft Knowledge Blog for additional specifics regarding these vulnerabilities. +
+