Enforced fingerprint bypass option, Fingerprint swipe result, Command-line tools – Lenovo ThinkVantage (Client Security Solution 8.21) User Manual

Page 38

Advertising
background image

To leverage the PKCS #11 module of Client Security Solution, the following policies must be set for Active
Directory:

1. PKCS #11 Signature

2. PKCS #11 Decryption

The following table provides the modifiable field and description of policies for PKCS# 11:

Table 10. ThinkVantage\Client Security Solution\Authentication Policies\PKCS# 11 Signature\Custom Mode

Fields

CSS.ADM

Modifiable field

Required

Field Description

Controls whether password or passphrase is required.

Possible values

• Enabled

– Every time

– Once per logon

• Disabled

• Not configured

Settings and policies for the fingerprint reader authentication

Enforced fingerprint bypass option

The fingerprint bypass option enables a user to bypass the fingerprint authentication and use a windows
password to log on. The user can select or deselect this option on the Password Manager user interface
when adding a new entry.

However, by default, the fingerprint bypass is enabled even if this option is not selected. This is to allow the
user to log on to Windows when the fingerprint sensor is not functional. To disable the enforced fingerprint
bypass option, edit the following registry key:

[HKEY_LOCAL_MACHINE\SOFTWARE\Lenovo\Client Security Solution\CSS Configuration]
"GinaDenyLogonDeviceNonEnrolled"=dword:00000001

When the registry key is set as above, the user can not bypass fingerprint authentication when the fingerprint
sensor is not working.

Fingerprint swipe result

During the fingerprint authentication, the below policy controls the display of fingerprint swipe results.

HKLM\Lenovo\TVT Common\Client Security Solution\FPSwipeResult

• FPSwipeResult=0: Show all messages.

• FPSwipeResult=1: Show failure messages only(default value).

• FPSwipeResult=2: Do not show any messages.

Command-line tools

ThinkVantage Technologies features can also be implemented locally or remotely by corporate IT
administrators through the command-line interface. Configuration settings can be maintained through
remote text file settings.

Client Security Solution has the following command-line tools:

32

Client Security Solution 8.21Deployment Guide

Advertising