<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en-GB">
	<id>https://docs.opendium.com/w/index.php?action=history&amp;feed=atom&amp;title=Microsoft_Windows_Configuration</id>
	<title>Microsoft Windows Configuration - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://docs.opendium.com/w/index.php?action=history&amp;feed=atom&amp;title=Microsoft_Windows_Configuration"/>
	<link rel="alternate" type="text/html" href="https://docs.opendium.com/w/index.php?title=Microsoft_Windows_Configuration&amp;action=history"/>
	<updated>2026-05-13T16:54:25Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.38.4</generator>
	<entry>
		<id>https://docs.opendium.com/w/index.php?title=Microsoft_Windows_Configuration&amp;diff=504&amp;oldid=prev</id>
		<title>Steve: /* One-to-one devices */</title>
		<link rel="alternate" type="text/html" href="https://docs.opendium.com/w/index.php?title=Microsoft_Windows_Configuration&amp;diff=504&amp;oldid=prev"/>
		<updated>2024-05-21T09:45:40Z</updated>

		<summary type="html">&lt;p&gt;&lt;span dir=&quot;auto&quot;&gt;&lt;span class=&quot;autocomment&quot;&gt;One-to-one devices&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;table style=&quot;background-color: #fff; color: #202122;&quot; data-mw=&quot;interface&quot;&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;tr class=&quot;diff-title&quot; lang=&quot;en-GB&quot;&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;← Older revision&lt;/td&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;Revision as of 10:45, 21 May 2024&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l1&quot;&gt;Line 1:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 1:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;== One-to-one devices ==&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;== One-to-one devices ==&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;−&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;This section covers devices which are always used by the same user, such as devices deployed in a one-to-one arrangement or bring your own device.  Scroll down for information regarding [[Microsoft Windows Configuration#Shared devices|Shared devices]] and [[Microsoft Windows Configuration#Multiuser servers|Multiuser servers]].&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;This section covers devices which are &lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;not joined to the Windows domain and &lt;/ins&gt;always used by the same user, such as devices deployed in a one-to-one arrangement or bring your own device.  Scroll down for information regarding [[Microsoft Windows Configuration#Shared devices|Shared devices]] &lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;(including domain-joined) &lt;/ins&gt;and [[Microsoft Windows Configuration#Multiuser servers|Multiuser servers]].&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br/&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br/&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;* If possible, configure your wireless network to use 802.1x (WPA-Enterprise) authentication and to [[RADIUS#Linking%20a%20network%20access%20controller%20to%20the%20Opendium%20system|send RADIUS accounting data]] to the Opendium system.  Set the [[Web: Permissions &amp;amp; Limits#User%20identification|User Identification]] mode to ''RADIUS''.  If 802.1x authentication cannot be used, Set the [[Web: Permissions &amp;amp; Limits#User%20identification|User Identification]] mode to ''Single User Devices''.&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;* If possible, configure your wireless network to use 802.1x (WPA-Enterprise) authentication and to [[RADIUS#Linking%20a%20network%20access%20controller%20to%20the%20Opendium%20system|send RADIUS accounting data]] to the Opendium system.  Set the [[Web: Permissions &amp;amp; Limits#User%20identification|User Identification]] mode to ''RADIUS''.  If 802.1x authentication cannot be used, Set the [[Web: Permissions &amp;amp; Limits#User%20identification|User Identification]] mode to ''Single User Devices''.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;

&lt;!-- diff cache key opendium_wiki:diff::1.12:old-319:rev-504 --&gt;
&lt;/table&gt;</summary>
		<author><name>Steve</name></author>
	</entry>
	<entry>
		<id>https://docs.opendium.com/w/index.php?title=Microsoft_Windows_Configuration&amp;diff=319&amp;oldid=prev</id>
		<title>Steve: Created page with &quot;== One-to-one devices == This section covers devices which are always used by the same user, such as devices deployed in a one-to-one arrangement or bring your own device.  Scroll down for information regarding Shared devices and Multiuser servers.  * If possible, configure your wireless network to use 802.1x (WPA-Enterprise) authentication and to RADIUS#Linking%20a...&quot;</title>
		<link rel="alternate" type="text/html" href="https://docs.opendium.com/w/index.php?title=Microsoft_Windows_Configuration&amp;diff=319&amp;oldid=prev"/>
		<updated>2022-10-13T10:39:49Z</updated>

		<summary type="html">&lt;p&gt;Created page with &amp;quot;== One-to-one devices == This section covers devices which are always used by the same user, such as devices deployed in a one-to-one arrangement or bring your own device.  Scroll down for information regarding &lt;a href=&quot;/wiki/Microsoft_Windows_Configuration#Shared_devices&quot; title=&quot;Microsoft Windows Configuration&quot;&gt;Shared devices&lt;/a&gt; and &lt;a href=&quot;/wiki/Microsoft_Windows_Configuration#Multiuser_servers&quot; title=&quot;Microsoft Windows Configuration&quot;&gt;Multiuser servers&lt;/a&gt;.  * If possible, configure your wireless network to use 802.1x (WPA-Enterprise) authentication and to RADIUS#Linking%20a...&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;== One-to-one devices ==&lt;br /&gt;
This section covers devices which are always used by the same user, such as devices deployed in a one-to-one arrangement or bring your own device.  Scroll down for information regarding [[Microsoft Windows Configuration#Shared devices|Shared devices]] and [[Microsoft Windows Configuration#Multiuser servers|Multiuser servers]].&lt;br /&gt;
&lt;br /&gt;
* If possible, configure your wireless network to use 802.1x (WPA-Enterprise) authentication and to [[RADIUS#Linking%20a%20network%20access%20controller%20to%20the%20Opendium%20system|send RADIUS accounting data]] to the Opendium system.  Set the [[Web: Permissions &amp;amp; Limits#User%20identification|User Identification]] mode to ''RADIUS''.  If 802.1x authentication cannot be used, Set the [[Web: Permissions &amp;amp; Limits#User%20identification|User Identification]] mode to ''Single User Devices''.&lt;br /&gt;
* If you are using 802.1x and RADIUS accounting, log the device onto the network with the user's credentials.&lt;br /&gt;
* If you are not using 802.1x and RADIUS accounting, the user must use the captive portal to authenticate.&lt;br /&gt;
&lt;br /&gt;
If the network's [[Web: Permissions &amp;amp; Limits#HTTPS%20decryption|HTTPS Decryption]] mode is set to ''Active'', you must install your unique Opendium inspection certificate:&lt;br /&gt;
&lt;br /&gt;
* Browse to https://''&amp;lt;your Opendium host name&amp;gt;''/opendium.crt (This URI is displayed on the [[Web]] tab).&lt;br /&gt;
* Go to ''Downloads.''&lt;br /&gt;
* Double click the certificate.&lt;br /&gt;
* Click ''Install Certificate'', which will launch the Certificate Import Wizard.&lt;br /&gt;
&lt;br /&gt;
[[File:Windows Certificate Import Wizard.png|alt=Windows Certificate Import Wizard|center|frame|Windows Certificate Import Wizard]]&lt;br /&gt;
&lt;br /&gt;
* Select ''Local Machine'' and click ''Next''.&lt;br /&gt;
&lt;br /&gt;
[[File:Windows Import Certificate Wizard - Local Machine.png|alt=Windows Import Certificate Wizard - Importing into Local Machine|center|frame|Windows Import Certificate Wizard - Importing into Local Machine]]&lt;br /&gt;
&lt;br /&gt;
* Click ''Yes'' in the User Account Control box which pops up.&lt;br /&gt;
&lt;br /&gt;
[[File:Windows Import Certificate - User Account Control.png|alt=User Account Control popup|center|frame|User Account Control popup]]&lt;br /&gt;
&lt;br /&gt;
* Select ''Place all certificates in the following store'' and click ''Browse''&lt;br /&gt;
* Select ''Trusted Root Certification Authorities'' and click ''Ok''.&lt;br /&gt;
&lt;br /&gt;
[[File:Windows - Select Certificate Store.png|alt=Select certificate store|center|frame|Select certificate store]]&lt;br /&gt;
&lt;br /&gt;
* Click ''Next'' in the Certificate Import Wizard.&lt;br /&gt;
&lt;br /&gt;
[[File:Windows Certificate Import Wizard - Import into Trusted Root Certification authorities.png|alt=Import into Trusted Root Certification authorities|center|frame|Import into Trusted Root Certification authorities]]&lt;br /&gt;
&lt;br /&gt;
* The final page of the wizard lets you review your settings. Click ''Finish'' and the certificate will be imported.&lt;br /&gt;
&lt;br /&gt;
[[File:Windows Import Certificate Wizard - Finish.png|alt=Windows Import Certificate Wizard - Finish|center|frame|Windows Import Certificate Wizard - Finish]]&lt;br /&gt;
&lt;br /&gt;
* A security warning will be displayed saying that Windows cannot validate the certificate. This is normal, click ''Yes''.&lt;br /&gt;
&lt;br /&gt;
[[File:Windows cannot validate certificate.png|alt=Security warning|center|frame|Security warning]]&lt;br /&gt;
&lt;br /&gt;
* The Certificate Import Wizard will pop up a box announcing that the certificate was successfully imported.&lt;br /&gt;
&lt;br /&gt;
[[File:Windows Certificate Import Wizard - Success.png|alt=Windows Certificate Import Wizard - Success|center|frame|Windows Certificate Import Wizard - Success]]&lt;br /&gt;
&lt;br /&gt;
=== Troubleshooting ===&lt;br /&gt;
These instructions explain how to confirm that the Opendium inspection certificate is installed on a stand alone Windows machine.  Windows versions 8 and 8.1 have a different style start menu to Windows versions 7 and 10, but the procedure is the same in all cases.&lt;br /&gt;
&lt;br /&gt;
* Click ''Start'' or press the Windows key, then type ''mmc'' and click the ''mmc'' command.&lt;br /&gt;
&lt;br /&gt;
[[File:Run mmc.png|alt=Search for mmc|center|frame|Search for mmc]]&lt;br /&gt;
[[File:Run mmc 2.png|alt=Run mmc|center|frame|Run mmc]]&lt;br /&gt;
&lt;br /&gt;
* If a ''User Account Control'' dialog pops up asking if you would like to allow Microsoft Management Console to make changes, click ''Yes''.&lt;br /&gt;
&lt;br /&gt;
[[File:User Account Control - mmc.png|alt=User Account Control|center|frame|User Account Control]]&lt;br /&gt;
&lt;br /&gt;
* Microsoft Management Console will then start, go to ''File -&amp;gt; Add/Remove Snap-in...''&lt;br /&gt;
&lt;br /&gt;
[[File:Mmc Add-Remove Snap-in.png|alt=Add/Remove Snap-in|center|frame|Add/Remove Snap-in]]&lt;br /&gt;
&lt;br /&gt;
* Add the certificate snap-in by double clicking or highlighting ''Certificates'' and clicking ''Add''.&lt;br /&gt;
&lt;br /&gt;
[[File:Mmc Add certificates Snap-in.png|alt=Add certificates Snap-in|center|frame|Add certificates Snap-in]]&lt;br /&gt;
&lt;br /&gt;
* Select the ''Computer account'' radio button and click ''Next''.&lt;br /&gt;
&lt;br /&gt;
[[File:Manage certificates for computer account.png|alt=Manage certificates for computer account|center|frame|Manage certificates for computer account]]&lt;br /&gt;
&lt;br /&gt;
* Leave the ''Local computer'' radio button selected and click ''Finish''.&lt;br /&gt;
&lt;br /&gt;
[[File:Select local computer.png|alt=Select local computer|center|frame|Select local computer]]&lt;br /&gt;
&lt;br /&gt;
* You should now see ''Certificates (Local Computer)'' in the right hand pane.&lt;br /&gt;
&lt;br /&gt;
[[File:Certificates snap-in installed for local computer.png|alt=Certificates snap-in installed for local computer|center|frame|Certificates snap-in installed for local computer]]&lt;br /&gt;
&lt;br /&gt;
* Click ''Ok'', which will take you back to MMC and should show ''Certificates (Local Computer)'' in the left hand pane.&lt;br /&gt;
&lt;br /&gt;
[[File:Mmc Certificates for Local Computer.png|alt=Certificates (Local Computer)|center|frame|Certificates (Local Computer)]]&lt;br /&gt;
&lt;br /&gt;
* Select ''Certificates (Local Computer) -&amp;gt; Trusted Root Certification Authorities -&amp;gt; Certificates''&lt;br /&gt;
* You should see the Opendium certificate listed in the right hand pane.&lt;br /&gt;
&lt;br /&gt;
[[File:Mmc Opendium certificate.png|alt=Opendium certificate in mmc|center|frame|Opendium certificate in mmc]]&lt;br /&gt;
&lt;br /&gt;
* For more details, double click the certificate and click the ''Details'' tab.&lt;br /&gt;
&lt;br /&gt;
[[File:Inspection Certificate Details.png|alt=Inspection certificate details|center|frame|Inspection certificate details]]&lt;br /&gt;
&lt;br /&gt;
== Shared devices ==&lt;br /&gt;
This section covers devices which are shared between multiple users (one user logged in at a time).  Scroll down for information regarding [[Microsoft Windows Configuration#Multiuser servers|multiuser servers]].&lt;br /&gt;
&lt;br /&gt;
=== Devices on the Windows domain ===&lt;br /&gt;
Client devices '''must''' use your non-transparent proxy, as this is a requirement of the Kerberos single signon protocol.  We recommend using automatic proxy discovery wherever possible.&lt;br /&gt;
&lt;br /&gt;
* The network that the device is being connected to should have [[Web: Permissions &amp;amp; Limits#Autoconfigure%20devices%20to%20use%20the%20proxy|Autoconfigure devices to use the proxy]] ticked in [[Web: Permissions &amp;amp; Limits|Permissions &amp;amp; Limits]].&lt;br /&gt;
* Ensure that the [[Installation Requirements#Internal%20DNS%20configuration|''wpad'' DNS records]] have been created on your internal domain.&lt;br /&gt;
* Ensure that your DHCP scopes are [[Installation Requirements#DHCP|correctly configured]].&lt;br /&gt;
* Group Policy should have no web proxy servers set, and &amp;quot;Automatically detect settings&amp;quot; should be ticked.&lt;br /&gt;
&lt;br /&gt;
* The network that the device is being connected to should have its user identification profile set to ''Workstations''.&lt;br /&gt;
&lt;br /&gt;
If the network's [[Web: Permissions &amp;amp; Limits#HTTPS%20decryption|HTTPS Decryption]] mode is set to ''Active'', you must install your unique Opendium inspection certificate.  This is usually done through Group Policy:&lt;br /&gt;
&lt;br /&gt;
* Browse to https://''&amp;lt;your Opendium host name&amp;gt;''/opendium.crt (This URI is displayed on the [[Web]] tab).&lt;br /&gt;
* Go to administrative tools on your domain controller and open ''Group Policy Management''.&lt;br /&gt;
&lt;br /&gt;
[[File:Open Group Policy Management.png|alt=Open Group Policy Management|center|frame|Open Group Policy Management]]&lt;br /&gt;
&lt;br /&gt;
* Right click and edit ''Default Domain Policy'' within your domain.&lt;br /&gt;
&lt;br /&gt;
[[File:Right click Default Domain Policy.png|alt=Right click Default Domain Policy|center|frame|Right click Default Domain Policy]]&lt;br /&gt;
&lt;br /&gt;
* Select ''Computer Configuration -&amp;gt; Policies -&amp;gt; Windows Settings -&amp;gt; Security Settings -&amp;gt; Public Key Policies -&amp;gt; Trusted Root Certification Authorities''.&lt;br /&gt;
&lt;br /&gt;
[[File:GPO select Trusted Root Certification Authorities.png|alt=GPO select Trusted Root Certification Authorities|center|frame|GPO select Trusted Root Certification Authorities]]&lt;br /&gt;
&lt;br /&gt;
* Right-click the right hand pane and click ''Import...'', which will start the certificate import wizard.&lt;br /&gt;
&lt;br /&gt;
[[File:GPO start import wizard.png|alt=Start Certificate Import Wizard|center|frame|Start Certificate Import Wizard]]&lt;br /&gt;
&lt;br /&gt;
* Click ''Next'' on the first page of the import wizard.&lt;br /&gt;
&lt;br /&gt;
[[File:GPO Certificate Import Wizard.png|alt=Certificate Import Wizard|center|frame|Certificate Import Wizard]]&lt;br /&gt;
&lt;br /&gt;
* Enter the file name of the new certificate, or use the ''Browse'' button to select it and click ''Next''.&lt;br /&gt;
&lt;br /&gt;
[[File:Certificate Import Wizard - Browse.png|alt=Browse for the certificate file|center|frame|Browse for the certificate file]]&lt;br /&gt;
&lt;br /&gt;
* The certificate location should be shown as ''Trusted Root Certification Authorities''.  If not, use the ''Browse'' button to set the store to ''Trusted Root Certification Authorities'' or ''Computer Configuration -&amp;gt; Policies -&amp;gt; Windows Settings -&amp;gt; Security Settings -&amp;gt; Public Key Policies -&amp;gt; Trusted Root Certification Authorities'', and then click ''Next''.&lt;br /&gt;
&lt;br /&gt;
[[File:Windows Certificate Import Wizard - Import into Trusted Root Certification authorities.png|alt=Import into Trusted Root Certification Authorities|center|frame|Import into Trusted Root Certification Authorities]]&lt;br /&gt;
&lt;br /&gt;
* The final page of the wizard lets you review your settings. Click ''Finish'' and the certificate will be imported into the GPO and it should then distribute across your domain.&lt;br /&gt;
&lt;br /&gt;
[[File:Windows Import Certificate Wizard - Finish.png|alt=Windows Import Certificate Wizard - Finish|center|frame]]&lt;br /&gt;
&lt;br /&gt;
===Stand alone devices===&lt;br /&gt;
Shared devices which are not connected to the Windows domain must authenticate through the captive portal:&lt;br /&gt;
*Configure your wireless network to use 802.1x (WPA-Enterprise) authentication and to [[RADIUS#Linking%20a%20network%20access%20controller%20to%20the%20Opendium%20system|send RADIUS accounting data]] to the Opendium system.&lt;br /&gt;
*Set the [[Web: Permissions &amp;amp; Limits#User%20identification|User Identification]] mode to ''RADIUS''.&lt;br /&gt;
*Log the device onto the network with a user name that starts with &amp;quot;op-shared-&amp;quot;.  For example, &amp;quot;op-shared-windows&amp;quot;.  This user must exist on the Opendium system.&lt;br /&gt;
*The user must use the captive portal to authenticate.&lt;br /&gt;
*When the user has finished with the device, they must disconnect from the wifi (i.e. turn wifi off on the device, shut down the device, or place the device in a shielded box/cupboard).&lt;br /&gt;
If the network's [[Web: Permissions &amp;amp; Limits#HTTPS%20decryption|HTTPS Decryption]] mode is set to ''Active'', you must install your unique Opendium inspection certificate.  See the instructions above in the [[Microsoft Windows Configuration#One-to-one devices|One-to-one devices]] section.&lt;br /&gt;
&lt;br /&gt;
Shared stand alone Windows devices cannot be supported on networks which do not support 802.1x and RADIUS accounting.  If your network cannot support 802.1x, the only option is to disable [[Web: Permissions &amp;amp; Limits#User%20identification|User Identification]].&lt;br /&gt;
&lt;br /&gt;
=== Troubleshooting ===&lt;br /&gt;
Shared devices on the Windows domain should transparently authenticate using Kerberos single sign-on.  If the device pops up authentication boxes rather than automatically authenticating, check that the clock on both the device and the domain controller are correct.  The Opendium server provides an NTP service and we recommend that your machines use this to keep their clocks synchronised.&lt;br /&gt;
&lt;br /&gt;
== Multiuser Servers ==&lt;br /&gt;
This section covers servers which allow logins for multiple concurrent users, and are connected to the Windows domain.  If the machine is not on the Windows domain, the only option is to disable [[Web: Permissions &amp;amp; Limits#User%20identification|User Identification]].&lt;br /&gt;
&lt;br /&gt;
Client devices '''must''' use your non-transparent proxy, as this is a requirement of the Kerberos single signon protocol.  We recommend using automatic proxy discovery wherever possible.&lt;br /&gt;
&lt;br /&gt;
* The network that the device is being connected to should have [[Web: Permissions &amp;amp; Limits#Autoconfigure%20devices%20to%20use%20the%20proxy|Autoconfigure devices to use the proxy]] ticked in [[Web: Permissions &amp;amp; Limits|Permissions &amp;amp; Limits]].&lt;br /&gt;
* Ensure that the [[Installation Requirements#Internal%20DNS%20configuration|''wpad'' DNS records]] have been created on your internal domain.&lt;br /&gt;
* Ensure that your DHCP scopes are [[Installation Requirements#DHCP|correctly configured]].&lt;br /&gt;
* Group Policy should have no web proxy servers set, and &amp;quot;Automatically detect settings&amp;quot; should be ticked.&lt;br /&gt;
&lt;br /&gt;
* The network that the device is being connected to should have its user identification profile set to ''Multiuser Servers''.&lt;br /&gt;
&lt;br /&gt;
If the network's HTTPS interception mode is set to ''Active'', you must install your unique Opendium interception certificate. This should be done through Windows Group Policy.  See the instructions above in the [[Microsoft Windows Configuration#Shared devices|Shared devices]] section.&lt;br /&gt;
&lt;br /&gt;
=== Limitations ===&lt;br /&gt;
&lt;br /&gt;
* Not all applications respect the proxy server settings and traffic for such software is instead caught by the transparent proxy and it is not possible to authenticate this traffic.  Most of the user identification modes expect only one user to be logged into each device at any one time and can therefore infer which user the unauthenticated traffic belongs to based on recently authenticated traffic from the same device. Inferring traffic ownership in this way is not possible for systems that have multiple concurrent users, and therefore transparent proxy traffic from ''Multiuser Servers'' will not have an owner associated with it.  Therefore, transparent proxy traffic will not be logged against an individual user, and will be filtered according to the ''Unidentified Users'' section of the [[Web: Policy Modelling|Policy Modelling]] report.&lt;br /&gt;
* Not all applications support authenticated web proxy servers, and of those which do, some do not support Kerberos single signon. Many of the user identification profiles use heuristics to prevent broken software from being required to authenticate, and instead infer the traffic's ownership as described above.  When the profile is set to ''Multiuser Servers'' these heuristics are disabled and all software using the non-transparent proxy is required to authenticate.  This may result in some applications failing to connect to the internet, or spurious pop-up authentication boxes.&lt;br /&gt;
&lt;br /&gt;
[[Category:Client Configuration]]&lt;/div&gt;</summary>
		<author><name>Steve</name></author>
	</entry>
</feed>