Smart Card Group Policy and Registry Settings (2024)

  • Article
  • Applies to:
    Windows 11, ✅ Windows 10, ✅ Windows Server 2022, ✅ Windows Server 2019, ✅ Windows Server 2016

This article for IT professionals and smart card developers describes the Group Policy settings, registry key settings, local security policy settings, and credential delegation policy settings that are available for configuring smart cards.

The following sections and tables list the smart card-related Group Policy settings and registry keys that can be set on a per-computer basis. If you use domain Group Policy Objects (GPOs), you can edit and apply Group Policy settings to local or domain computers.

  • Primary Group Policy settings for smart cards
    • Allow certificates with no extended key usage certificate attribute
    • Allow ECC certificates to be used for logon and authentication
    • Allow Integrated Unblock screen to be displayed at the time of logon
    • Allow signature keys valid for Logon
    • Allow time invalid certificates
    • Allow user name hint
    • Configure root certificate clean up
    • Display string when smart card is blocked
    • Filter duplicate logon certificates
    • Force the reading of all certificates from the smart card
    • Notify user of successful smart card driver installation
    • Prevent plaintext PINs from being returned by Credential Manager
    • Reverse the subject name stored in a certificate when displaying
    • Turn on certificate propagation from smart card
    • Turn on root certificate propagation from smart card
    • Turn on Smart Card Plug and Play service
  • Base CSP and Smart Card KSP registry keys
  • CRL checking registry keys
  • Additional smart card Group Policy settings and registry keys

Primary Group Policy settings for smart cards

The following smart card Group Policy settings are in Computer Configuration\Administrative Templates\Windows Components\Smart Card.

The registry keys are in the following locations:

  • HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\ScPnP\EnableScPnP
  • HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\SmartCardCredentialProvider
  • HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\CertProp

Note

Smart card reader registry information is in HKEY_LOCAL_MACHINE\Software\Microsoft\Cryptography\Calais\Readers.
Smart card registry information is in HKEY_LOCAL_MACHINE\Software\Microsoft\Cryptography\Calais\SmartCards.

The following table lists the default values for these GPO settings. Variations are documented under the policy descriptions in this article.

Server type or GPODefault value
Default Domain PolicyNot configured
Default Domain Controller PolicyNot configured
Stand-Alone Server Default SettingsNot configured
Domain Controller Effective Default SettingsDisabled
Member Server Effective Default SettingsDisabled
Client Computer Effective Default SettingsDisabled

Allow certificates with no extended key usage certificate attribute

You can use this policy setting to allow certificates without an extended key usage (EKU) set to be used for sign-in.

Note

extended key usage certificate attribute is also known as extended key usage.

In versions of Windows before Windows Vista, smart card certificates that are used to sign in require an EKU extension with a smart card logon object identifier. This policy setting can be used to modify that restriction.

When this policy setting is turned on, certificates with the following attributes can also be used to sign in with a smart card:

  • Certificates with no EKU
  • Certificates with an All Purpose EKU
  • Certificates with a Client Authentication EKU

When this policy setting isn't turned on, only certificates that contain the smart card logon object identifier can be used to sign in with a smart card.

ItemDescription
Registry keyAllowCertificatesWithNoEKU
Default valuesNo changes per operating system versions
Disabled and not configured are equivalent
Policy managementRestart requirement: None
Sign off requirement: None
Policy conflicts: None

Allow ECC certificates to be used for logon and authentication

You can use this policy setting to control whether elliptic curve cryptography (ECC) certificates on a smart card can be used to sign in to a domain.

When this setting is turned on, ECC certificates on a smart card can be used to sign in to a domain.

When this setting isn't turned on, ECC certificates on a smart card can't be used to sign in to a domain.

ItemDescription
Registry keyEnumerateECCCerts
Default valuesNo changes per operating system versions
Disabled and not configured are equivalent
Policy managementRestart requirement: None
Sign off requirement: None
Policy conflicts: None
Notes and resourcesThis policy setting only affects a user's ability to sign in to a domain. ECC certificates on a smart card that are used for other applications, such as document signing, aren't affected by this policy setting.
If you use an ECDSA key to sign in, you must also have an associated ECDH key to permit sign in when you're not connected to the network.

Allow Integrated Unblock screen to be displayed at the time of logon

You can use this policy setting to determine whether the integrated unblock feature is available in the sign-in user interface (UI). The feature was introduced as a standard feature in the Credential Security Support Provider in Windows Vista.

When this setting is turned on, the integrated unblock feature is available.

When this setting isn't turned on, the feature is not available.

ItemDescription
Registry keyAllowIntegratedUnblock
Default valuesNo changes per operating system versions
Disabled and not configured are equivalent
Policy managementRestart requirement: None
Sign off requirement: None
Policy conflicts: None
Notes and resourcesTo use the integrated unblock feature, the smart card must support it. Check with the hardware manufacturer to verify that the smart card supports this feature.
You can create a custom message that the user sees when the smart card is blocked by configuring the policy setting Display string when smart card is blocked.

Allow signature keys valid for Logon

You can use this policy setting to allow signature key-based certificates to be enumerated and available for sign-in.

When this setting is turned on, any certificates that are available on the smart card with a signature-only key are listed on the sign-in screen.

When this setting isn't turned on, certificates available on the smart card with a signature-only key aren't listed on the sign-in screen.

ItemDescription
Registry keyAllowSignatureOnlyKeys
Default valuesNo changes per operating system versions
Disabled and not configured are equivalent
Policy managementRestart requirement: None
Sign off requirement: None
Policy conflicts: None

Allow time invalid certificates

You can use this policy setting to permit certificates that are expired or not yet valid to be displayed for sign-in.

Note

Before Windows Vista, certificates were required to contain a valid time and to not expire. For a certificate to be used, it must be accepted by the domain controller. This policy setting only controls which certificates are displayed on the client computer.

When this setting is turned on, certificates are listed on the sign-in screen whether they have an invalid time, or their time validity has expired.

When this policy setting isn't turned on, certificates that are expired or not yet valid aren't listed on the sign-in screen.

ItemDescription
Registry keyAllowTimeInvalidCertificates
Default valuesNo changes per operating system versions
Disabled and not configured are equivalent
Policy managementRestart requirement: None
Sign off requirement: None
Policy conflicts: None

Allow user name hint

You can use this policy setting to determine whether an optional field appears during sign-in and provides a subsequent elevation process where users can enter their username or username and domain, which associates a certificate with the user.

When this policy setting is turned on, users see an optional field where they can enter their username or username and domain.

When this policy setting isn't turned on, users don't see this optional field.

ItemDescription
Registry keyX509HintsNeeded
Default valuesNo changes per operating system versions
Disabled and not configured are equivalent
Policy managementRestart requirement: None
Sign off requirement: None
Policy conflicts: None

Configure root certificate clean-up

You can use this policy setting to manage the cleanup behavior of root certificates. Certificates are verified by using a trust chain, and the trust anchor for the digital certificate is the Root Certification Authority (CA). A CA can issue multiple certificates with the root certificate as the top certificate of the tree structure. A private key is used to sign other certificates. This creates an inherited trustworthiness for all certificates immediately under the root certificate.

When this policy setting is turned on, you can set the following cleanup options:

  • No cleanup. When the user signs out or removes the smart card, the root certificates used during their session persist on the computer.
  • Clean up certificates on smart card removal. When the smart card is removed, the root certificates are removed.
  • Clean up certificates on log off. When the user signs out of Windows, the root certificates are removed.

When this policy setting isn't turned on, root certificates are automatically removed when the user signs out of Windows.

ItemDescription
Registry keyRootCertificateCleanupOption
Default valuesNo changes per operating system versions
Disabled and not configured are equivalent
Policy managementRestart requirement: None
Sign off requirement: None
Policy conflicts: None

Display string when smart card is blocked

You can use this policy setting to change the default message that a user sees if their smart card is blocked.

When this policy setting is turned on, you can create and manage the displayed message that the user sees when a smart card is blocked.

When this policy setting isn't turned on (and the integrated unblock feature is also enabled), the user sees the system's default message when the smart card is blocked.

ItemDescription
Registry keyIntegratedUnblockPromptString
Default valuesNo changes per operating system versions
Disabled and not configured are equivalent
Policy managementRestart requirement: None
Sign off requirement: None
Policy conflicts: This policy setting is only effective when the Allow Integrated Unblock screen to be displayed at the time of logon policy is enabled.

Filter duplicate logon certificates

You can use this policy setting to configure which valid sign-in certificates are displayed.

Note

During the certificate renewal period, a user's smart card can have multiple valid sign-in certificates issued from the same certificate template, which can cause confusion about which certificate to select. This behavior can occur when a certificate is renewed and the old certificate has not expired yet.

If two certificates are issued from the same template with the same major version and they are for the same user (this is determined by their UPN), they are determined to be the same.

When this policy setting is turned on, filtering occurs so that the user can select from only the most current valid certificates.

If this policy setting isn't turned on, all the certificates are displayed to the user.

This policy setting is applied to the computer after the Allow time invalid certificates policy setting is applied.

ItemDescription
Registry keyFilterDuplicateCerts
Default valuesNo changes per operating system versions
Disabled and not configured are equivalent
Policy managementRestart requirement: None
Sign off requirement: None
Policy conflicts: None
Notes and resourcesIf there are two or more of the same certificates on a smart card and this policy setting is enabled, the certificate with the most distant expiration time is displayed.

Force the reading of all certificates from the smart card

You can use this policy setting to manage how Windows reads all certificates from the smart card for sign-in. During sign-in, Windows reads only the default certificate from the smart card unless it supports retrieval of all certificates in a single call. This policy setting forces Windows to read all the certificates from the smart card.

When this policy setting is turned on, Windows attempts to read all certificates from the smart card, regardless of the CSP feature set.

When this policy isn't turned on, Windows attempts to read only the default certificate from smart cards that don't support retrieval of all certificates in a single call. Certificates other than the default aren't available for sign-in.

ItemDescription
Registry keyForceReadingAllCertificates
Default valuesNo changes per operating system versions
Disabled and not configured are equivalent
Policy managementRestart requirement: None
Sign off requirement: None
Policy conflicts: None

Important: Enabling this policy setting can adversely impact performance during the sign-in process in certain situations.

Notes and resourcesContact the smart card vendor to determine if your smart card and associated CSP support the required behavior.

Notify user of successful smart card driver installation

You can use this policy setting to control whether the user sees a confirmation message when a smart card device driver is installed.

When this policy setting is turned on, the user sees a confirmation message when a smart card device driver is installed.

When this setting isn't turned on, the user doesn't see a smart card device driver installation message.

----
Registry keyScPnPNotification
Default valuesNo changes per operating system versions
Disabled and not configured are equivalent
Policy managementRestart requirement: None
Sign off requirement: None
Policy conflicts: None
Notes and resourcesThis policy setting applies only to smart card drivers that have passed the Windows Hardware Quality Labs (WHQL) testing process.

Prevent plaintext PINs from being returned by Credential Manager

You can use this policy setting to prevent Credential Manager from returning plaintext PINs.

Note

Credential Manager is controlled by the user on the local computer, and it stores credentials from supported browsers and Windows applications. Credentials are saved in special encrypted folders on the computer under the user's profile.

When this policy setting is turned on, Credential Manager doesn't return a plaintext PIN.

When this setting isn't turned on, Credential Manager can return plaintext PINs.

ItemDescription
Registry keyDisallowPlaintextPin
Default valuesNo changes per operating system versions
Disabled and not configured are equivalent
Policy managementRestart requirement: None
Sign off requirement: None
Policy conflicts: None
Notes and resourcesIf this policy setting is enabled, some smart cards might not work in computers running Windows. Consult the smart card manufacturer to determine whether this policy setting should be enabled.

Reverse the subject name stored in a certificate when displaying

You can use this policy setting to control the way the subject name appears during sign-in.

Note

To help users distinguish one certificate from another, the user principal name (UPN) and the common name are displayed by default. For example, when this setting is enabled, if the certificate subject is CN=User1, OU=Users, DN=example, DN=com and the UPN is user1@example.com, User1 is displayed with user1@example.com. If the UPN is not present, the entire subject name is displayed. This setting controls the appearance of that subject name, and it might need to be adjusted for your organization.

When this policy setting is turned on, the subject name during sign-in appears reversed from the way that it's stored in the certificate.

When this policy setting isn't turned on, the subject name appears the same as it's stored in the certificate.

ItemDescription
Registry keyReverseSubject
Default valuesNo changes per operating system versions
Disabled and not configured are equivalent
Policy managementRestart requirement: None
Sign off requirement: None
Policy conflicts: None

Turn on certificate propagation from smart card

You can use this policy setting to manage the certificate propagation that occurs when a smart card is inserted.

Note

The certificate propagation service applies when a signed-in user inserts a smart card in a reader that is attached to the computer. This action causes the certificate to be read from the smart card. The certificates are then added to the user's Personal store.

When this policy setting is turned on, certificate propagation occurs when the user inserts the smart card.

When this policy setting is turned off, certificate propagation doesn't occur, and the certificates aren't available to applications, like Outlook.

ItemDescription
Registry keyCertPropEnabled
Default valuesNo changes per operating system versions
Enabled and not configured are equivalent
Policy managementRestart requirement: None
Sign off requirement: None
Policy conflicts: This policy setting must be enabled to allow the Turn on root certificate propagation from smart card setting to work when it is enabled.

Turn on root certificate propagation from smart card

You can use this policy setting to manage the root certificate propagation that occurs when a smart card is inserted.

Note

The certificate propagation service applies when a signed-in user inserts a smart card in a reader that is attached to the computer. This action causes the certificate to be read from the smart card. The certificates are then added to the user's Personal store.

When this policy setting is turned on, root certificate propagation occurs when the user inserts the smart card.

When this policy setting isn't turned on, root certificate propagation doesn't occur when the user inserts the smart card.

ItemDescription
Registry keyEnableRootCertificate Propagation
Default valuesNo changes per operating system versions
Enabled and not configured are equivalent
Policy managementRestart requirement: None
Sign off requirement: None
Policy conflicts: For this policy setting to work, the Turn on certificate propagation from smart card policy setting must also be enabled.
Notes and resources

Turn on Smart Card Plug and Play service

You can use this policy setting to control whether Smart Card Plug and Play is enabled.

Note

Your users can use smart cards from vendors who have published their drivers through Windows Update without needing special middleware. These drivers will be downloaded in the same way as drivers for other devices in Windows. If an appropriate driver isn't available from Windows Update, a PIV-compliant mini driver that's included with any of the supported versions of Windows is used for these cards.

When this policy setting is turned on, the system attempts to install a smart card device driver the first time a smart card is inserted in a smart card reader.

When this policy setting isn't turned on, a device driver isn't installed when a smart card is inserted in a smart card reader.

ItemDescription
Registry keyEnableScPnP
Default valuesNo changes per operating system versions
Enabled and not configured are equivalent
Policy managementRestart requirement: None
Sign off requirement: None
Policy conflicts: None
Notes and resourcesThis policy setting applies only to smart card drivers that have passed the Windows Hardware Quality Labs (WHQL) testing process.

Base CSP and Smart Card KSP registry keys

The following registry keys can be configured for the base cryptography service provider (CSP) and the smart card key storage provider (KSP). The following tables list the keys. All keys use the DWORD type.

The registry keys for the Base CSP are in the registry in HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography\Defaults\Provider\Microsoft Base Smart Card Crypto Provider.

The registry keys for the smart card KSP are in HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Cryptography\Providers\Microsoft Smart Card Key Storage Provider.

Registry keys for the base CSP and smart card KSP

Registry KeyDescription
AllowPrivateExchangeKeyImportA non-zero value allows RSA exchange (for example, encryption) private keys to be imported for use in key archival scenarios.
Default value: 00000000
AllowPrivateSignatureKeyImportA non-zero value allows RSA signature private keys to be imported for use in key archival scenarios.
Default value: 00000000
DefaultPrivateKeyLenBitsDefines the default length for private keys, if desired.
Default value: 00000400
Default key generation parameter: 1024-bit keys
RequireOnCardPrivateKeyGenThis key sets the flag that requires on-card private key generation (default). If this value is set, a key generated on a host can be imported into the smart card. This is used for smart cards that don't support on-card key generation or where key escrow is required.
Default value: 00000000
TransactionTimeoutMillisecondsDefault timeout values allow you to specify whether transactions that take an excessive amount of time will fail.
Default value: 000005dc
The default timeout for holding transactions to the smart card is 1.5 seconds.

Additional registry keys for the smart card KSP:

Registry KeyDescription
AllowPrivateECDHEKeyImportThis value allows Ephemeral Elliptic Curve Diffie-Hellman (ECDHE) private keys to be imported for use in key archival scenarios.
Default value: 00000000
AllowPrivateECDSAKeyImportThis value allows Elliptic Curve Digital Signature Algorithm (ECDSA) private keys to be imported for use in key archival scenarios.
Default value: 00000000

CRL checking registry keys

The following table lists the keys and the corresponding values to turn off certificate revocation list (CRL) checking at the Key Distribution Center (KDC) or client. To manage CRL checking, you must configure settings for both the KDC and the client.

Registry KeyDetails
HKEY_LOCAL_MACHINE\SYSTEM\CCS\Services\Kdc\UseCachedCRLOnlyAndIgnoreRevocationUnknownErrorsType = DWORD
Value = 1
HKEY_LOCAL_MACHINE\SYSTEM\CCS\Control\LSA\Kerberos\Parameters\UseCachedCRLOnlyAndIgnoreRevocationUnknownErrorsType = DWORD
Value = 1

Additional smart card Group Policy settings and registry keys

In a smart card deployment, additional Group Policy settings can be used to enhance ease-of-use or security. Two of these policy settings that can complement a smart card deployment are:

  • Turning off delegation for computers
  • Interactive logon: Do not require CTRL+ALT+DEL (not recommended)

The following smart card-related Group Policy settings are in Computer Configuration\Windows Settings\Security Settings\Local Policies\Security Options.

Local security policy settings

Group Policy setting and registry keyDefaultDescription
Interactive logon: Require smart card

scforceoption

DisabledThis security policy setting requires users to sign in to a computer by using a smart card.

Enabled Users can sign in to the computer only by using a smart card.
Disabled Users can sign in to the computer by using any method.

NOTE: the Windows LAPS-managed local account is exempted from this policy when Enabled.

Interactive logon: Smart card removal behavior

scremoveoption

This policy setting isn't defined, which means that the system treats it as No Action.This setting determines what happens when the smart card for a signed-in user is removed from the smart card reader. The options are:
No Action
Lock Workstation: The workstation is locked when the smart card is removed, so users can leave the area, take their smart card with them, and still maintain a protected session.
Force Logoff: The user is automatically signed out when the smart card is removed.
Disconnect if a Remote Desktop Services session: Removal of the smart card disconnects the session without signing out the user. The user can reinsert the smart card and resume the session later, or at another computer that's equipped with a smart card reader, without having to sign in again. If the session is local, this policy setting functions identically to the Lock Workstation option.

From the Local Security Policy Editor (secpol.msc), you can edit and apply system policies to manage credential delegation for local or domain computers.

The following smart card-related Group Policy settings are in Computer Configuration\Administrative Templates\System\Credentials Delegation.

Registry keys are in HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Lsa\Credssp\PolicyDefaults.

Note

In the following table, fresh credentials are those that you are prompted for when running an application.

Credential delegation policy settings

Group Policy setting and registry keyDefaultDescription
Allow Delegating Fresh Credentials

AllowFreshCredentials

Not configuredThis policy setting applies:
When server authentication was achieved through a trusted X509 certificate or Kerberos protocol.
To applications that use the CredSSP component (for example, Remote Desktop Services).

Enabled: You can specify the servers where the user's fresh credentials can be delegated.
Not configured: After proper mutual authentication, delegation of fresh credentials is permitted to Remote Desktop Services running on any computer.
Disabled: Delegation of fresh credentials to any computer isn't permitted.

Note: This policy setting can be set to one or more service principal names (SPNs). The SPN represents the target server where the user credentials can be delegated. A single wildcard character is permitted when specifying the SPN, for example:
Use *TERMSRV/** for Remote Desktop Session Host (RD Session Host) running on any computer.
Use TERMSRV/host.humanresources.fabrikam.com for RD Session Host running on the host.humanresources.fabrikam.com computer.
Use TERMSRV/*.humanresources.fabrikam.com for RD Session Host running on all computers in .humanresources.fabrikam.com

Allow Delegating Fresh Credentials with NTLM-only Server Authentication

AllowFreshCredentialsWhenNTLMOnly

Not configuredThis policy setting applies:
When server authentication was achieved by using NTLM.
To applications that use the CredSSP component (for example, Remote Desktop).

Enabled: You can specify the servers where the user's fresh credentials can be delegated.
Not configured: After proper mutual authentication, delegation of fresh credentials is permitted to RD Session Host running on any computer (TERMSRV/*).
Disabled: Delegation of fresh credentials isn't permitted to any computer.

Note: This policy setting can be set to one or more SPNs. The SPN represents the target server where the user credentials can be delegated. A single wildcard character (*) is permitted when specifying the SPN.
See the Allow Delegating Fresh Credentials policy setting description for examples.

Deny Delegating Fresh Credentials

DenyFreshCredentials

Not configuredThis policy setting applies to applications that use the CredSSP component (for example, Remote Desktop).

Enabled: You can specify the servers where the user's fresh credentials can't be delegated.
Disabled or Not configured: A server is not specified.

Note: This policy setting can be set to one or more SPNs. The SPN represents the target server where the user credentials can't be delegated. A single wildcard character (*) is permitted when specifying the SPN.
For examples, see the "Allow delegating fresh credentials" policy setting.

If you're using Remote Desktop Services with smart card logon, you can't delegate default and saved credentials. The registry keys in the following table, which are at HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Lsa\Credssp\PolicyDefaults, and the corresponding Group Policy settings are ignored.

Registry KeyCorresponding Group Policy setting
AllowDefaultCredentialsAllow Delegating Default Credentials
AllowDefaultCredentialsWhenNTLMOnlyAllow Delegating Default Credentials with NTLM-only Server Authentication
AllowSavedCredentialsAllow Delegating Saved Credentials
AllowSavedCredentialsWhenNTLMOnlyAllow Delegating Saved Credentials with NTLM-only Server Authentication

See also

Smart Card Technical Reference

Smart Card Group Policy and Registry Settings (2024)

FAQs

How do I allow smart card login in group policy? ›

To require smart card login for all users on a computer

In the Group Policy Management Editor, expand Computer Configuration > Policies > Centrify Settings > Linux Settings, click Security, then double-click Require smart card login.

How do I remove extra registry settings from group policy? ›

The Remove-GPRegistryValue cmdlet removes one or more registry-based policy settings from either Computer Configuration or User Configuration in a Group Policy Object (GPO). You can specify the GPO by its display name or by its GUID.

How do I change registry settings in group policy? ›

Right-click on Registry Settings and choose Edit. NOTE: We can configure the settings on a Computer basis or User basis. Expand Computer Configuration > Preferences > Windows Settings > Registry. Right click on the right empty pane and choose New > Registry Item.

Can I disable smart card service? ›

In the details pane, double-click Windows Components, and then double-click Smart Card. Right-click Turn on Smart Card Plug and Play service, and then click Edit. Click Disabled/Enabled, and then click OK.

How do I turn off SmartScreen group policy? ›

Open it by pressing 'Windows key + R' then typing 'gpedit. msc' and Enter. Go to 'Computer Configuration > Administrative Templates > Windows Components > File Explorer'. Find the policy 'Configure Windows Defender SmartScreen' and choose 'Enabled' or 'Disabled'.

How do I stop Group Policy from changing registry key? ›

Policies of that nature would typically be run as the system user. If you take away the system user's access, or make it read-only, policy won't be able to change the key/values anymore.

What are extra registry settings? ›

So what actually happens when Extra registry settings is showing up for you is that a setting you have set long time ago is not found in any ADMX file anymore. All settings are matched to the a key and valueName in the ADMX file, and if the setting isn't found “Extra registry setting” will show up.

Where are GPO settings stored in the registry? ›

The registry. pol in the C:\Windows\System32\GroupPolicy\Machine is an artefact of the GPO Engine, the policies are downloaded but they are saved in the C:\Windows\System32\GroupPolicy\DataStore folder.

How do I manually edit group policy? ›

Open the Control Panel on the Start Menu. Click the Windows icon on the Toolbar, and then click the widget icon for Settings. Start typing 'group policy' or 'gpedit' and click the 'Edit Group Policy' option.

What is the smart card removal policy? ›

The smart card removal policy service is applicable when a user signs in with a smart card and then removes that smart card from the reader. The action that is performed when the smart card is removed is controlled by group policy settings. For more information, see Smart Card Group Policy and Registry Settings.

What is the purpose of a smart card? ›

Smart cards can provide personal identification, authentication, data storage, and application processing. Applications include identification, financial, public transit, computer security, schools, and healthcare.

Is it necessary to have a smart card? ›

FAQS of Smart Card Driving License

The smart card driving license is not compulsory in India. Your driving license can be in the paper or book format as well. However, it is mandatory to hold a valid driving license while riding or driving a vehicle on Indian roads.

Why smart card login is not supported for your account? ›

If you are experiencing the "You cannot use a smart card to log on because smart card logon is not supported for your user account" error when attempting to log in to your Windows computer using the smart card on the YubiKey, this indicates your domain controller(s) does not have a valid certificate.

How do I enable NLA in group policy? ›

Enabling via Local Group Policy editor

Computer Configuration -> Administrative Templates -> Windows Components -> Remote Desktop Services -> Remote Desktop Session Host -> Security. Double-click on the option titled “Require user authentication for remote connections by using Network Level Authentication.”

Where in group policy can you locate the policy that requires a smart card? ›

Navigate to Smart Card Policies: In the Local Group Policy Editor, navigate to the following location: Computer Configuration -> Administrative Templates -> System -> Smart Card is required for interactive logon.

Top Articles
Latest Posts
Article information

Author: Dean Jakubowski Ret

Last Updated:

Views: 6117

Rating: 5 / 5 (70 voted)

Reviews: 93% of readers found this page helpful

Author information

Name: Dean Jakubowski Ret

Birthday: 1996-05-10

Address: Apt. 425 4346 Santiago Islands, Shariside, AK 38830-1874

Phone: +96313309894162

Job: Legacy Sales Designer

Hobby: Baseball, Wood carving, Candle making, Jigsaw puzzles, Lacemaking, Parkour, Drawing

Introduction: My name is Dean Jakubowski Ret, I am a enthusiastic, friendly, homely, handsome, zealous, brainy, elegant person who loves writing and wants to share my knowledge and understanding with you.