Network Unlock
Network Unlock is a BitLocker key protector for operating system volumes. Network Unlock enables easier management for BitLocker-enabled desktops and servers in a domain environment by providing automatic unlock of operating system volumes at system reboot when connected to a wired corporate network. Network Unlock requires the client hardware to have a DHCP driver implemented in its UEFI firmware. Without Network Unlock, operating system volumes protected by TPM+PIN
protectors require a PIN to be entered when a device reboots or resumes from hibernation (for example, by Wake on LAN). Requiring a PIN after a reboot can make it difficult for enterprises to roll out software patches to unattended desktops and remotely administered servers.
Network Unlock allows BitLocker-enabled systems that have a TPM+PIN
and that meet the hardware requirements to boot into Windows without user intervention. Network Unlock works in a similar fashion to the TPM+StartupKey
at boot. Rather than needing to read the StartupKey from USB media, however, the Network Unlock feature needs the key to be composed from a key stored in the TPM and an encrypted network key that is sent to the server, decrypted and returned to the client in a secure session.
System requirements
Network Unlock must meet mandatory hardware and software requirements before the feature can automatically unlock domain-joined systems. These requirements include:
- Any supported operating system with UEFI DHCP drivers that can serve as Network Unlock clients
- Network Unlock clients with a TPM chip and at least one TPM protector
- A server running the Windows Deployment Services (WDS) role on any supported server operating system
- BitLocker Network Unlock optional feature installed on any supported server operating system
- A DHCP server, separate from the WDS server
- Properly configured public/private key pairing
- Network Unlock group policy settings configured
- Network stack enabled in the UEFI firmware of client devices
Important
To support DHCP within UEFI, the UEFI-based system should be in native mode and shouldn't have a compatibility support module (CSM) enabled.
For Network Unlock to work reliably, the first network adapter on the device, usually the onboard adapter, must be configured to support DHCP. This first network adapter must be used for Network Unlock. This configuration is especially worth noting when the device has multiple adapters, and some adapters are configured without DHCP, such as for use with a lights-out management protocol. This configuration is necessary because Network Unlock stops enumerating adapters when it reaches one with a DHCP port failure for any reason. Thus, if the first enumerated adapter doesn't support DHCP, isn't plugged into the network, or fails to report availability of the DHCP port for any reason, then Network Unlock fails.
The Network Unlock server component is installed on supported versions of Windows Server as a Windows feature that uses Server Manager or Windows PowerShell cmdlets. The feature name is BitLocker Network Unlock
in Server Manager and BitLocker-NetworkUnlock
in PowerShell.
Network Unlock requires Windows Deployment Services (WDS) in the environment where the feature will be utilized. Configuration of the WDS installation isn't required. However, the WDS service must be running on the server.
The network key is stored on the system drive along with an AES 256 session key and encrypted with the 2048-bit RSA public key of the Unlock server certificate. The network key is decrypted with the help of a provider on a supported version of Windows Server running WDS, and returned encrypted with its corresponding session key.
Network Unlock sequence
The unlock sequence starts on the client side when the Windows boot manager detects the existence of Network Unlock protector. It uses the DHCP driver in UEFI to obtain an IP address for IPv4 and then broadcasts a vendor-specific DHCP request that contains the network key and a session key for the reply, all encrypted by the server's Network Unlock certificate. The Network Unlock provider on the supported WDS server recognizes the vendor-specific request, decrypts it with the RSA private key, and returns the network key encrypted with the session key via its own vendor-specific DHCP reply.
On the server side, the WDS server role has an optional plugin component, like a PXE provider, which is what handles the incoming Network Unlock requests. The provider can also be configured with subnet restrictions, which would require that the IP address provided by the client in the Network Unlock request belong to a permitted subnet to release the network key to the client. In instances where the Network Unlock provider is unavailable, BitLocker fails over to the next available protector to unlock the drive. In a typical configuration, the standard TPM+PIN
unlock screen is presented to unlock the drive.
The server side configuration to enable Network Unlock also requires provisioning a 2048-bit RSA public/private key pair in the form of an X.509 certificate, and distributing the public key certificate to the clients. This certificate is the public key that encrypts the intermediate network key (which is one of the two secrets required to unlock the drive; the other secret is stored in the TPM), and it must be managed and deployed via Group Policy.
The Network Unlock process follows these phases:
- The Windows boot manager detects a Network Unlock protector in the BitLocker configuration
- The client computer uses its DHCP driver in the UEFI to get a valid IPv4 IP address
- The client computer broadcasts a vendor-specific DHCP request that contains a network key (a 256-bit intermediate key) and an AES-256 session key for the reply. The network key is encrypted by using the 2048-bit RSA Public Key of the Network Unlock certificate from the WDS server
- The Network Unlock provider on the WDS server recognizes the vendor-specific request
- The provider decrypts the request by using the WDS server's BitLocker Network Unlock certificate RSA private key
- The WDS provider returns the network key encrypted with the session key by using its own vendor-specific DHCP reply to the client computer. This key is an intermediate key
- The returned intermediate key is combined with another local 256-bit intermediate key. This key can be decrypted only by the TPM
- This combined key is used to create an AES-256 key that unlocks the volume
- Windows continues the boot sequence
Configure Network Unlock
The following steps allow an administrator to configure Network Unlock in an Active Directory domain.
Install the WDS server role
The BitLocker Network Unlock feature installs the WDS role if it isn't already installed. WDS can be installed separately, before BitLocker Network Unlock is installed, by using Server Manager or PowerShell. To install the role using Server Manager, select the Windows Deployment Services role in Server Manager.
To install the role by using PowerShell, use the following command:
Install-WindowsFeature WDS-Deployment
The WDS server must be configured so that it can communicate with DHCP (and optionally AD DS) and the client computer. The WDS server can be configured using the WDS management tool, wdsmgmt.msc
, which starts the Windows Deployment Services Configuration wizard.
Confirm the WDS service is running
To confirm that the WDS service is running, use the Services Management Console or PowerShell. To confirm that the service is running in Services Management Console, open the console using services.msc
and check the status of the Windows Deployment Services service.
To confirm that the service is running using PowerShell, use the following command:
Get-Service WDSServer
Install the Network Unlock feature
To install the Network Unlock feature, use Server Manager or PowerShell. To install the feature using Server Manager, select the BitLocker Network Unlock feature in the Server Manager console.
To install the feature by using PowerShell, use the following command:
Install-WindowsFeature BitLocker-NetworkUnlock
Create the certificate template for Network Unlock
A properly configured Active Directory Certification Authority can use this certificate template to create and issue Network Unlock certificates.
Open the Certificates Template snap-in (
certtmpl.msc
)Locate the User template, right-click the template name and select Duplicate Template
On the Compatibility tab, change the Certification Authority and Certificate recipient fields to Windows Server 2016 and Windows 10, respectively. Ensure that the Show resulting changes dialog box is selected
Select the General tab of the template. The Template display name and Template name should identify that the template will be used for Network Unlock. Clear the check box for the Publish certificate in Active Directory option
Select the Request Handling tab. Select Encryption from the Purpose drop-down menu. Ensure that the Allow private key to be exported option is selected
Select the Cryptography tab. Set the Minimum key size to 2048. Any Microsoft cryptographic provider that supports RSA can be used for this template, but for simplicity and forward compatibility, it is recommended to use Microsoft Software Key Storage Provider
Select the Requests must use one of the following providers option and clear all options except for the cryptography provider selected, such as Microsoft Software Key Storage Provider
Select the Subject Name tab. Select Supply in the request. Select OK if the certificate templates pop-up dialog appears
Select the Issuance Requirements tab. Select both CA certificate manager approval and Valid existing certificate options
Select the Extensions tab. Select Application Policies and choose Edit…
In the Edit Application Policies Extension options dialog box, select Client Authentication, Encrypting File System, and Secure Email and choose Remove
On the Edit Application Policies Extension dialog box, select Add
On the Add Application Policy dialog box, select New. In the New Application Policy dialog box, enter the following information in the space provided and then select OK to create the BitLocker Network Unlock application policy:
- Name: BitLocker Network Unlock
- Object Identifier: 1.3.6.1.4.1.311.67.1.1
Select the newly created BitLocker Network Unlock application policy and select OK
With the Extensions tab still open, select the Edit Key Usage Extension dialog. Select the Allow key exchange only with key encryption (key encipherment) option. Select the Make this extension critical option
Select the Security tab. Confirm that the Domain Admins group has been granted Enroll permission
Select OK to complete configuration of the template
To add the Network Unlock template to the certificate authority, open the certificate authority snap-in (certsrv.msc
). Right-click Certificate Templates, and then choose New, Certificate Template to issue. Select the previously created BitLocker Network Unlock certificate.
After the Network Unlock template is added to the certificate authority, this certificate can be used to configure BitLocker Network Unlock.
Create the Network Unlock certificate
Network Unlock can use imported certificates from an existing public key infrastructure (PKI). Or it can use a self-signed certificate.
To enroll a certificate from an existing certificate authority:
- On the WDS server, open Certificate Manager by using
certmgr.msc
- Under Certificates - Current User, right-click Personal
- Select All Tasks > Request New Certificate
- When the Certificate Enrollment wizard opens, select Next
- Select Active Directory Enrollment Policy
- Choose the certificate template that was created for Network Unlock on the domain controller. Then select Enroll
- When prompted for more information, select Subject Name and provide a friendly name value. The friendly name should include information for the domain or organizational unit for the certificate For example: BitLocker Network Unlock Certificate for Contoso domain
- Create the certificate. Ensure the certificate appears in the Personal folder
- Export the public key certificate for Network Unlock:
- Create a
.cer
file by right-clicking the previously created certificate, selecting All Tasks, and then selecting Export - Select No, do not export the private key
- Select DER encoded binary X.509 and complete exporting the certificate to a file
- Give the file a name such as BitLocker-NetworkUnlock.cer
- Create a
- Export the public key with a private key for Network Unlock
- Create a
.pfx
file by right-clicking the previously created certificate, selecting All Tasks, and then selecting Export - Select Yes, export the private key
- Complete the steps to create the
.pfx
file
- Create a
To create a self-signed certificate, either use the New-SelfSignedCertificate
cmdlet in Windows PowerShell or use certreq.exe
. For example:
PowerShell
New-SelfSignedCertificate -CertStoreLocation Cert:\LocalMachine\My -Subject "CN=BitLocker Network Unlock certificate" -Provider "Microsoft Software Key Storage Provider" -KeyUsage KeyEncipherment -KeyUsageProperty Decrypt,Sign -KeyLength 2048 -HashAlgorithm sha512 -TextExtension @("1.3.6.1.4.1.311.21.10={text}OID=1.3.6.1.4.1.311.67.1.1","2.5.29.37={text}1.3.6.1.4.1.311.67.1.1")
certreq.exe
Create a text file with an
.inf
extension, for example:notepad.exe BitLocker-NetworkUnlock.inf
Add the following contents to the previously created file:
[NewRequest] Subject="CN=BitLocker Network Unlock certificate" ProviderType=0 MachineKeySet=True Exportable=true RequestType=Cert KeyUsage="CERT_KEY_ENCIPHERMENT_KEY_USAGE" KeyUsageProperty="NCRYPT_ALLOW_DECRYPT_FLAG | NCRYPT_ALLOW_SIGNING_FLAG" KeyLength=2048 SMIME=FALSE HashAlgorithm=sha512 [Extensions] 1.3.6.1.4.1.311.21.10 = "{text}" _continue_ = "OID=1.3.6.1.4.1.311.67.1.1" 2.5.29.37 = "{text}" _continue_ = "1.3.6.1.4.1.311.67.1.1"
Open an elevated Command Prompt and use the
certreq.exe
tool to create a new certificate. Use the following command, specifying the full path to the file that was created previously along with the file name:certreq.exe -new BitLocker-NetworkUnlock.inf BitLocker-NetworkUnlock.cer
Verify that certificate was properly created by the previous command by confirming that the
.cer
file existsLaunch the Certificates - Local Computer console by running
certlm.msc
Create a
.pfx
file by following the below steps the Certificates - Local Computer console:- Navigate to Certificates - Local Computer > Personal > Certificates
- Right-click the previously imported certificate, select All Tasks, and then select Export
- Follow through the wizard to create the
.pfx
file
Deploy the private key and certificate to the WDS server
After creating the certificate and key, deploy them to the infrastructure to properly unlock systems. To deploy the certificates:
- On the WDS server, launch the Certificates - Local Computer console by running
certlm.msc
- Right-click BitLocker Drive Encryption Network Unlock item under Certificates (Local Computer), select All Tasks, and then select Import
- In the File to Import dialog, choose the
.pfx
file created previously - Enter the password used to create the
.pfx
and complete the wizard
Configure group policy settings for Network Unlock
With certificate and key deployed to the WDS server for Network Unlock, the final step is to use group policy settings to deploy the public key certificate to the desired computers that will use the Network Unlock key to unlock. Group policy settings for BitLocker can be found under Computer Configuration > Administrative Templates > Windows Components > BitLocker Drive Encryption using the Local Group Policy Editor or the Microsoft Management Console.
The following steps describe how to enable the group policy setting that is a requirement for configuring Network Unlock.
- Open Group Policy Management Console (
gpmc.msc
) - Enable the policy Require additional authentication at startup, and then select Require startup PIN with TPM or Allow startup PIN with TPM
- Turn on BitLocker with TPM+PIN protectors on all domain-joined computers
The following steps describe how to deploy the required group policy setting:
Copy the
.cer
file that was created for Network Unlock to the domain controllerOn the domain controller, open Group Policy Management Console (
gpmc.msc
)Create a new Group Policy Object or modify an existing object to enable the Allow Network Unlock at startup setting
Deploy the public certificate to clients:
Within group policy management console, navigate to the following location:
Computer Configuration > Policies > Windows Settings > Security Settings > Public Key Policies > BitLocker Drive Encryption Network Unlock Certificate.
Right-click the folder and select Add Network Unlock Certificate
Follow the wizard steps and import the
.cer
file that was copied earlier
Note
Only one Network Unlock certificate can be available at a time. If a new certificate is needed, delete the current certificate before deploying a new one. The Network Unlock certificate is located under the
HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\SystemCertificates\FVE_NKP
registry key on the client computer.Reboot the clients after the Group Policy is deployed
Note
The Network (Certificate Based) protector will be added only after a reboot, with the policy enabled and a valid certificate present in the FVE_NKP store.
Subnet policy configuration files on the WDS server (optional)
By default, all clients with the correct Network Unlock certificate and valid Network Unlock protectors that have wired access to a Network Unlock-enabled WDS server via DHCP are unlocked by the server. A subnet policy configuration file on the WDS server can be created to limit which are the subnet(s) the Network Unlock clients can use to unlock.
The configuration file called bde-network-unlock.ini
, must be located in the same directory as the Network Unlock provider DLL (%windir%\System32\Nkpprov.dll
) and it applies to both IPv6 and IPv4 DHCP implementations. If the subnet configuration policy becomes corrupted, the provider fails and stops responding to requests.
The subnet policy configuration file must use a [SUBNETS]
section to identify the specific subnets. The named subnets may then be used to specify restrictions in certificate subsections. Subnets are defined as simple name-value pairs, in the common INI format, where each subnet has its own line, with the name on the left of the equal-sign, and the subnet identified on the right of the equal-sign as a Classless Inter-Domain Routing (CIDR) address or range. The key word ENABLED
is disallowed for subnet names.
[SUBNETS]
SUBNET1=10.185.250.0/24 ; a comment about this subrange could be here, after the semicolon
SUBNET2=10.185.252.200/28
SUBNET3= 2001:4898:a:2::/64 ; an IPv6 subnet
SUBNET4=2001:4898:a:3::/64; in production, the admin would likely give more useful names, like BUILDING9-EXCEPT-RECEP.
Following the [SUBNETS]
section, there can be sections for each Network Unlock certificate, identified by the certificate thumbprint formatted without any spaces, which define the subnets clients that can be unlocked from that certificate.
Note
When specifying the certificate thumbprint, do not include any spaces. If spaces are included in the thumbprint, the subnet configuration fails because the thumbprint will not be recognized as valid.
Subnet restrictions are defined within each certificate section by denoting the allowed list of permitted subnets. If any subnets are listed in a certificate section, then only those subnets are permitted for that certificate. If no subnet is listed in a certificate section, then all subnets are permitted for that certificate. If a certificate doesn't have a section in the subnet policy configuration file, then no subnet restrictions are applied for unlocking with that certificate. For restrictions to apply to every certificate, there must be a certificate section for every Network Unlock certificate on the server, and an explicit allowed list set for each certificate section.
Subnet lists are created by putting the name of a subnet from the [SUBNETS]
section on its own line below the certificate section header. Then, the server will only unlock clients with this certificate on the subnet(s) specified as in the list. For troubleshooting, a subnet can be quickly excluded without deleting it from the section by commenting it out with a prepended semi-colon.
[2158a767e1c14e88e27a4c0aee111d2de2eafe60]
;Comments could be added here to indicate when the cert was issued, which Group Policy should get it, and so on.
;This list shows this cert is allowed to unlock clients only on the SUBNET1 and SUBNET3 subnets. In this example, SUBNET2 is commented out.
SUBNET1
;SUBNET2
SUBNET3
To disallow the use of a certificate altogether, add a DISABLED
line to its subnet list.
Turn off Network Unlock
To turn off the unlock server, the PXE provider can be unregistered from the WDS server or uninstalled altogether. However, to stop clients from creating Network Unlock protectors, the Allow Network Unlock at startup group policy setting should be disabled. When this policy setting is updated to disabled on client computers, any Network Unlock key protector on the computer is deleted. Alternatively, the BitLocker Network Unlock certificate policy can be deleted on the domain controller to accomplish the same task for an entire domain.
Note
Removing the FVE_NKP certificate store that contains the Network Unlock certificate and key on the WDS server will also effectively disable the server's ability to respond to unlock requests for that certificate. However, this is seen as an error condition and is not a supported or recommended method for turning off the Network Unlock server.
Update Network Unlock certificates
To update the certificates used by Network Unlock, administrators need to import or generate the new certificate for the server, and then update the Network Unlock certificate group policy setting on the domain controller.
Note
Servers that don't receive the group policy setting require a PIN when they boot. In such cases, find out why the servers don't receive the GPO to update the certificate.
Troubleshoot Network Unlock
Troubleshooting Network Unlock issues begins by verifying the environment. Many times, a small configuration issue can be the root cause of the failure. Items to verify include:
Verify that the client hardware is UEFI-based and is on firmware version 2.3.1 and that the UEFI firmware is in native mode without a Compatibility Support Module (CSM) for BIOS mode enabled. Verification can be done by checking that the firmware doesn't have an option enabled such as "Legacy mode" or "Compatibility mode" or that the firmware doesn't appear to be in a BIOS-like mode
If client hardware is a Secure Core device, you may need to disable Secure Core functionality
All required roles and services are installed and started
Public and private certificates have been published and are in the proper certificate containers. The presence of the Network Unlock certificate can be verified in the Microsoft Management Console (MMC.exe) on the WDS server with the certificate snap-ins for the local computer enabled. The client certificate can be verified by checking the registry key
HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\SystemCertificates\FVE_NKP
on the client computerGroup policy for Network Unlock is enabled and linked to the appropriate domains
Verify whether group policy is reaching the clients properly. Verification of group policy can be done using the
GPRESULT.exe
orRSOP.msc
utilitiesVerify whether the clients were rebooted after applying the policy
Verify whether the Network (Certificate Based) protector is listed on the client. Verification of the protector can be done using either manage-bde or Windows PowerShell cmdlets. For example, the following command will list the key protectors currently configured on the C: drive of the local computer:
manage-bde.exe -protectors -get C:
Note
Use the output of
manage-bde.exe
along with the WDS debug log to determine whether the proper certificate thumbprint is being used for Network Unlock.
Gather the following files to troubleshoot BitLocker Network Unlock.
The Windows event logs. Specifically, get the BitLocker event logs and the
Microsoft-Windows-Deployment-Services-Diagnostics-Debug
logDebug logging is turned off by default for the WDS server role. To retrieve WDS debug logs, the WDS debug logs first need to be enabled. Use either of the following two methods to turn on WDS debug logging.
Start an elevated Command Prompt, and then run the following command:
wevtutil.exe sl Microsoft-Windows-Deployment-Services-Diagnostics/Debug /e:true
Open Event Viewer on the WDS server:
- In the left pane, navigate to Applications and Services Logs > Microsoft > Windows > Deployment-Services-Diagnostics > Debug
- In the right pane, select Enable Log
The DHCP subnet configuration file (if one exists)
The output of the BitLocker status on the volume. Gather this output into a text file by using
manage-bde.exe -status
. Or in Windows PowerShell, useGet-BitLockerVolume
The Network Monitor capture on the server that hosts the WDS role, filtered by client IP address