PAM360 serves as a secure vault for sensitive passwords, necessitating robust authentication mechanisms to access the software. To cater to diverse environments, PAM360 provides multiple authentication options, including local authentication and integration with external identity stores such as Active Directory (AD), Microsoft Entra ID, and LDAP. Strengthening security further, PAM360 supports smart card authentication. This advanced authentication method requires both possession of a smart card and knowledge of its associated PIN, ensuring enhanced access control.
It is important to note that smart card authentication in PAM360 serves as the primary authentication mechanism and is distinct from Two-Factor Authentication. If smart card authentication is deployed in your environment, PAM360 can be configured to authenticate users via smart cards, bypassing traditional first-factor authentication methods such as AD, Entra ID, LDAP, or local authentication.
Steps to Enable Smart Card Authentication in PAM360:
When users attempt to access the PAM360 web interface, they must first complete smart card authentication on their machine by presenting the smart card and entering the associated PIN. PAM360 supplements smart card technology with SSL communication, prompting users to provide their X.509 certificate for access. Users may:

If using an internal certificate, specify the root certificate of the CA that issued the X.509 user certificates. For third-party CA-signed certificates, this step can be skipped. To import the root certificate, follow these steps:

Once imported, certificates signed by this CA are automatically recognized.
An essential step in integrating smart card authentication with PAM360 is mapping user details between the smart card certificate and the PAM360 user database. This process ensures that the attribute in the smart card certificate, which uniquely identifies the user, aligns with the corresponding attribute in the PAM360 user database.
This mapping involves two key actions:
PAM360 provides flexibility to select any attribute from the smart card certificate that uniquely identifies the user within your environment. You can choose attributes such as SAN.OtherName, SAN.RFC822Name, SAN.DirName, SAN.DNSName, SAN.URI, or Common Name. During the authentication process, PAM360 retrieves the value of the selected attribute and compares it with the corresponding attribute in the PAM360 user database.
To configure this, select the desired attribute from the Certificate Attribute drop-down menu.
Additional Detail
If your environment requires an attribute not listed for uniquely identifying users, contact PAM360 support to have it added.
After selecting the certificate attribute, define the corresponding mapping attribute in the PAM360 user database. This attribute is determined by how the user was added to PAM360; either manually or via Active Directory/LDAP.
For users added manually to PAM360, the username attribute in the PAM360 database is typically the only viable choice for comparison with the smart card certificate. In such cases, leave the default value, username, in the text field.
For users imported from Active Directory or LDAP, the default attribute used to uniquely identify the user is typically userPrincipalName. However, in some environments, other attributes like distinguishedName may be used for this purpose. Select the appropriate attribute based on your setup.
Once you have completed the configurations for both the certificate attribute and its mapping in PAM360, Save the settings to finalize the process.
PAM360 verifies the revocation status of certificates using the Online Certificate Status Protocol (OCSP). For certificates lacking OCSP details, configure OCSP server information as follows:


To disable OCSP checks, set the property ocsp.check to false in the System Properties file located in the conf folder of the PAM360 installation directory.
Caution
Internet access is required for OCSP validation, and enterprise networks may require proxy server settings.

Another crucial step in the authentication process involves comparing the user's presented certificate with the certificates stored within the system or Active Directory/LDAP. For manually added users, the X.509 certificate saved in the PAM360 database is validated against the certificate provided by the user during authentication.
In case, you do not have AD or LDAP in your environment, you need to manually put the x.509 format SSL certificate used for smart card authentication into PAM360. To do so, follow these steps:

Upon competing all the above required operation, smart card authentication can be enabled for the PAM360 application. To do so, navigate to Admin >> Authentication >> Smart Card / PKI / Certificate, and click Enable to activate smart card authentication.
Caution

After enabling or disabling smart card authentication, restart the PAM360 server and web browser to apply changes.
If High Availability is configured, replicate smart card authentication settings on the secondary server. To do so, follow these steps:
1. What if the client certificate selection pop-up does not appear during authentication?
If the pop-up to select a client certificate does not appear during authentication, restart the browser and try again.