Imprivata ID for Windows Access
This topic provides an overview of Imprivata ID for Windows Access, what you need to deploy it in your enterprise, and roll it out to users.
Adding Imprivata ID to Windows access is ideal when an extra layer of security is needed for certain users and/or certain computers; for example, administrative accounts or access to virtual desktop servers.
When the user logs into Windows with his username and password, Imprivata ID sends a push notification to his device. He accepts and is granted access.
The user can be prompted to download Imprivata ID and enroll before and/or after the desktop opens.
The user must have a supported iOS or Android device and the Imprivata ID app installed; no additional hardware is required at the endpoint computer to support this workflow.
Licensing Considerations
Unlike other desktop authentication methods that require an Authentication Management license, when you enable Imprivata ID for Windows Access, each user in that policy only counts towards your Confirm ID for Remote Access license total. See Imprivata Licensed Features
Enroll Users
Your users can download and install the Imprivata ID app at any time. They are not prompted to enroll Imprivata ID or use it to authenticate until they are included in a user policy that requires Imprivata ID for authentication.
Require Imprivata ID for Windows Access
There are several methods to enable Imprivata ID for Windows Access. You can set up either of these or both:
- User Requirement — Require all users in a policy complete two-factor authentication with Imprivata ID every time they authenticate at any endpoint computer.
- Computer Requirement — Require Imprivata ID for Windows Access only at specific desktops.

Configure the User Policy
-
In the Imprivata Admin Console, go to Users > User Policies.
-
Add a new user policy, or make a copy of an existing user policy. See Creating and Managing User Policies
-
Move the required users into this user policy.
-
On the Authentication tab, go to the Licensed option section and select Imprivata ID for Windows Access.
-
In the Desktop Access authentication section, select Password for the primary factor, and Imprivata ID for the secondary factor.
- Click Save.
Configure the Login and Enrollment Options
-
In the Authentication method options section, go to Password. If you want to allow a grace period where the user does not need to respond to a push notification from Imprivata ID, make that selection here:
-
Workflow during grace period — To authenticate, user enters username and password only.
-
Workflow after grace period — To authenticate, user enters username and password, then must respond to the push notification from Imprivata ID.
-
-
In the Authentication method options section, go to Imprivata ID. Configure your requirements for enrolling Imprivata ID here:
-
You can force the user to enroll Imprivata ID before they can access the desktop, or allow them to skip enrollment for up to 90 days.
-
Before the desktop opens, the user will be prompted to enroll Imprivata ID. You can also prompt the user to enroll Imprivata ID after the desktop opens.
-
-
Click Save.

Enable Licensed Option
-
In the Imprivata Admin Console, go to Users > User Policies.
-
Select the policy that contains users who will require Imprivata ID for Windows Access.
-
On the Authentication tab, go to the Licensed option section and select Imprivata ID for Windows Access.
-
Do not select Imprivata ID in the Desktop Access authentication section.
-
Click Save.
Set a Computer Policy Override
-
In the Imprivata Admin Console, go to Computers > Computer Policies.
-
Add a new computer policy, or make a copy of an existing computer policy. See Creating and Managing Computer Policies
-
Move the required computers into this computer policy. See Managing Computer Accounts
-
On the Override and Restrict tab, go to the Desktop Access Authentication Restrictions section and select Restrict user policy.
-
Select Password for the primary factor and Imprivata ID for the secondary factor.
-
Click Save.
Configure the Login and Enrollment Options
-
In the Authentication method options section, go to Password. If you want to allow a grace period where the user does not need to enter their second-factor authentication, make that selection here.
-
In the Authentication method options section, go to Imprivata ID. Configure your requirements for enrolling Imprivata ID here:
-
-
You can force the user to enroll Imprivata ID before they can access the desktop, or allow them to skip enrollment for up to 90 days.
-
Before the desktop opens, the user will be prompted to enroll Imprivata ID. You can also prompt the user to enroll Imprivata IDafter the desktop opens.
-
-
Click Save.
The Imprivata Credential Provider and Windows Login
If your enterprise is licensed for Imprivata Confirm ID Remote Access but you do not have an Imprivata Authentication Management or Single Sign-On license, the Imprivata credential provider does not appear when logging into Windows workstations. You must override log in and locking of Windows workstations and use the Imprivata credential provider to manage logging into Windows workstations instead:
Configure Workstations to Use the Imprivata Credential Provider
- In the Imprivata Admin Console, go to Computers > Computer Policies.
- Select a computer policy where the Imprivata credential provider must be used.
- Go to the General tab > Desktop experience section. If the Windows credential provider is in use, Override log in and locking of the Windows workstation is selected here.
- Uncheck Override log in and locking of the Windows workstation.
- Click Save.
Repeat this process for any other computer policies that will require Imprivata ID for Windows access.
Ensure Access for Non-Imprivata Users
If your enterprise is licensed for Imprivata Confirm ID Remote Access but you do not have an Imprivata Authentication Management or Single Sign-On license, users who are not synchronized with the Imprivata user database or configured to use Imprivata ID for Windows Access can still log into Windows.
When the Imprivata credential provider appears on a Windows desktop and a non-Imprivata user enters their username and password, OneSign authentication fails (because they're not in the Imprivata user database), but if Windows local authentication succeeds, are allowed to log in.
To allow non-OneSign users to log in, you can add them to an Active Directory or Local group, and allow this Local group to authenticate to Windows if OneSign authentication fails.
To confirm the default setting in the Imprivata Admin Console:
-
In the Imprivata Admin Console, go to Computers > Computer policies.
-
Select a computer policy where Imprivata ID for Windows Access is required.
-
Go to the General tab > Authentication section.
-
Verify that If OneSign authentication fails, but Windows authentication succeeds, should the user be allowed to log in to the computer? to Yes.
-
Click Save.
-
Repeat this process for any other computer policies where non-Imprivata users must be able to log in.
Troubleshooting

If specific users are experiencing issues with push authentication, make sure the Imprivata ID app is running on the user's device.
If that doesn't resolve the issue, make sure the user's device meets all of the following requirements:
iOS Requirements
|
Android Requirements
|

If the Imprivata database is restored while users are enrolling Imprivata IDs, or after Imprivata IDs have been enrolled, the users must re-enroll their Imprivata IDs. Contact Imprivata Customer Support for assistance.

You can resolve some errors that occur during DigiCert identity proofing. If the error message instructs you to
- "Delete record and notify user to restart identity proofing", or
- "Delete identity proofing record and notify user to restart process"
Delete the user's record but do not delete the user:
- In the Imprivata Admin Console, go to Users > Users and find the user in the database.
- On the user detail page, go to DigiCert Individual Identity Proofing and click Delete Record. This action is permanent and the user must identity proof again for EPCS.
- Notify the user to start identity proofing again.
If you delete the entire user from the Imprivata Confirm ID database, you will have to wait five days for the system to reset before they can use that same email address again for identity proofing.

Clinicians who e-prescribe controlled substances with a Symantec VIP token can continue to use this token with Imprivata Confirm ID after identity proofing with Digicert. The following workaround is only applicable for:
- users who have already completed identity proofing with Symantec NSL and
- enrolled their VIP token for EPCS and
- completed identity proofing with Digicert and
- are associated with the Imprivata Confirm ID EPCS workflow and
- that workflow allows OTP tokens for authentication.
- In the Symantec VIP Manager, remove the user's VIP software token (Users > Search User > Edit Details > Credential > Remove)
- In the Imprivata Admin Console, remove the user's VIP software token: Go to Users > Symantec VIP Credentials, select the user, and click Remove From This User.
- In the Symantec VIP Manager, disable the user's account (Users > Search User > from the Search Results page, click Disable Credential)
- In the Symantec VIP Manager, enable the user's account again (Users > Search User > from the Search Results page, click Enable Credential).
- Advise the user to re-enroll the Symantec VIP token with Imprivata Confirm ID.

Cloud Connection
Imprivata Services will enter the Enterprise ID and one-time cloud provisioning code required to establish trust between your Imprivata enterprise and the Imprivata cloud:
- If you're not on the Cloud Connection page already: In the Imprivata Admin Console, click the gear icon > Cloud connection.
- Services will enter your Enterprise ID and cloud provisioning code.
- Click Establish trust.
The cloud connection must be established by Imprivata Services.
Cloud Connection Status
You can review the status of your enterprise's connection to the Imprivata cloud at any time. Status notifications are displayed on the Imprivata Admin Console, and the cloud connection status of every appliance at every site is also available:
-
In the Imprivata Admin Console, go to the gear icon > Cloud connection.
-
Every appliance host is listed with its status. If there are problems with a connection, recommendations for resolving the problem are displayed here.