Smart Card Authentication

ADSelfService Plus allows admins to add a Smart Card button to the login screen, enabling users to access the self-service portal and applications securely without a username or a password. 

Passwordless logins to the ADSelfService Plus portal using smart cards.
Note: Smart card authentication can also be used as an MFA method to protect enterprise apps, Windows machines, self-service actions like password resets and account unlocks, Outlook on the web logins, VPN logins via secure verification links, and logins to ADSelfService Plus. To learn about what smart cards are, how the authentication process works, and other ways to leverage the smart card authenticator using ADSelfService Plus, click here.

Preparing your smart card authentication environment

Enrolling in smart card authentication can be done by users as well as the admin. The general steps are as follows:

  1. Users need to be issued a digital certificate and a private key by your organization's certificate authority (CA).
  2. Note: Ensure that supported AD user attributes that have unique values, such as employeeID, sAMAccountName, or userPrincipalName, have valid values that can be mapped to the corresponding certificate attributes, like SAN.OtherName, SAN.RFC822Name, SAN.DirName, SAN.DNSName, SAN.URI, emailaddress, distinguishedName, or CommonName, in the user's certificate. The values in both the attributes that are linked must be the same for mapping to be successful.
    • If you are using AD's CA, you can refer to the Microsoft guide on requesting and granting certificates.
    • If an external CA is used for smart card enrollment, the certificates must be imported into AD and linked to the respective user's userCertificate attribute.
  3. Now, the certificate and the private key (usually issued together as a PFX file) from your CA should be enrolled into the smart cards to complete the preparation steps.
    • For smart cards on machines:
      • Windows: Import the PFX file directly into the user's personal store via the Certificate Manager tool (certmgr.exe).
      • macOS: Not applicable (only physical smart cards are compatible with macOS).
      • Linux: Using your browser settings, import the PFX file via the Certificate Manager tab, and the CA root certificate via the Authorities tab.
    • For physical smart cards, please refer to the documentation provided by your smart card vendor on how to enroll the certificates with the hardware.

Prerequisites

  1. ADSelfService Plus must be using an HTTPS connection. Learn more.
  2. Obtain the CA root certificate from a CA.

Configuration steps

Now that the certificates are in the user's personal certificate store or on their physical devices, and the prerequisites for ADSelfService Plus have been met, let us configure passwordless authentication using smart cards for the ADSelfService Plus portal.

  1. Log in to the ADSelfService Plus web console with admin credentials.
  2. Navigate to Admin > Customize > Logon Settings.
  3. Click the Smart Card Authentication tab.
  4. Configuring passwordless logins to the ADSelfService Plus portal using smart cards.

  5. In the Import CA Root Certification field, click Browse to import the required root certification file (X.509 certificate) obtained in step two of the prerequisites.
  6. In the Mapping Attribute in Certificate field, select a unique attribute in the certificate for mapping.
    • Ensure that a unique attribute from the certificate is mapped to a unique attribute in AD. Both attributes must have the same values.
    • ADSelfService Plus provides the ability to select any attribute of the smart card certificate that uniquely identifies a user. You can choose SAN.OtherName, SAN.RFC822Name, SAN.DirName, SAN.DNSName, SAN.URI, email, distinguishedName, or CommonName. In case other attributes are used to uniquely identify the user in your environment, enter the attribute name in the text box provided and click the + icon.

    Passwordless logins to the ADSelfService Plus portal for specific domains using smart cards.

  7. In the Mapping Attribute in AD field, specify the LDAP attribute that should be matched with the specified certificate attribute.
    • Here, you need to specify the particular LDAP attribute that uniquely identifies the user in AD (e.g., sAMAccountName).
    • During authentication, ADSelfService Plus reads the value corresponding to the certificate attribute that you specified in the certificate's mapping attribute and compares it with the specified mapping attribute in AD.
  8. In the Linked Domains field, select the domains for which you want to enable smart card authentication from the drop-down.
  9. Click Save.
  10. Restart ADSelfService Plus for the changes to take effect.
  11. Note: Smart card authentication is not supported when Load Balancer or Reverse Proxy is enabled for ADSelfService Plus.

Managing smart card authentication configurations

After you have added a smart card for authentication, you can perform any of the following functions:

Adding a new smart card

  1. Navigate to Admin > Customize > Logon Settings > Smart Card Authentication.
  2. Click the Add a New Smartcard button in the top-right corner.
  3. Enter all the required details and click Save.

Modifying a configured smart card

  1. Navigate to Admin > Customize > Logon Settings > Smart Card Authentication.
  2. Click the pencil icon (edit icon) corresponding to the smart card whose configuration you wish to edit.
  3. Modify the settings you wish to change.
  4. Click Save.

Enabling or disabling a configured smart card

  1. Navigate to Admin > Customize > Logon Settings > Smart Card Authentication.
  2. To enable or disable a configured smart card, click the red icon (disable icon) or green check icon (enable icon) located in the action column of a particular smart card.

Deleting a configured smart card

  1. Navigate to Admin > Customize > Logon Settings > Smart Card Authentication.
  2. Click the delete icon (delete icon) on the smart card which you wish to delete.
  3. Click Yes to confirm the deletion.

Your request has been submitted to the ADSelfService Plus technical support team. Our technical support people will assist you at the earliest.

 

Need technical assistance?

  • Enter your email ID
  • Talk to experts
  •  
     
  •  
  • By clicking 'Talk to experts' you agree to processing of personal data according to the Privacy Policy.

Don't see what you're looking for?

  •  

    Visit our community

    Post your questions in the forum.

     
  •  

    Request additional resources

    Send us your requirements.

     
  •  

    Need implementation assistance?

    Try OnboardPro

     

On this page

Copyright © 2025, ZOHO Corp. All Rights Reserved.