Console terminology: In the Maverics Console, this section is called
Identity Fabric. The YAML configuration uses the
connectors key to define
identity provider integrations.Overview
The Windows Client Authenticator connector authenticates users via their Windows desktop credentials using NTLM. Unlike OIDC or SAML connectors, WCA does not use a standard federation protocol — it runs as a dedicated IIS application on a Windows server and communicates directly with the Orchestrator over HTTPS. WCA only supports login functionality. It does not retrieve user attributes beyond the authenticated username. For additional attributes such as email, display name, or group memberships, pair the WCA connector with an Attribute Provider such as Active Directory.Use Cases
- Unified SSO for Windows desktop environments — Extend single sign-on to web applications using existing Windows domain credentials via NTLM, so users on domain-joined machines authenticate seamlessly without additional passwords
- Legacy Windows app modernization — Bridge NTLM-authenticated Windows environments with modern cloud IdPs through the Orchestrator, enabling a unified authentication experience across on-premises and cloud applications
- Seamless Kerberos/NTLM-to-web SSO — Authenticate users with their Windows desktop session and pass identity to the Orchestrator, eliminating separate login prompts for web applications in enterprise Windows environments
- Attribute-enriched Windows authentication — Pair WCA with an Active Directory attribute provider to retrieve group memberships, email, and other directory attributes alongside NTLM authentication
Requirements
| Requirement | Details |
|---|---|
| Operating system | Windows Server 2008 R2 or later |
| IIS | Internet Information Services with web server features enabled |
| .NET runtime | .NET 7.0.13 Windows Server Hosting bundle (the installer will install the bundle for you if not already installed) |
| Permissions | Administrator privileges on the Windows server |
Installation
Follow these steps to install and configure the WCA on your IIS server:Run the WCA installer
Run the WCA installer downloaded from your Maverics deployment. The installer creates an IIS application for the WCA.
Configure authentication settings
Under the WCA application’s Authentication settings, enable both Anonymous Authentication and Windows Authentication.

WCA v2.x and later requires Anonymous Authentication to be enabled for the
/status health endpoint.Configure Windows Authentication providers
Under Windows Authentication > Providers, ensure NTLM is the only enabled provider.

Upgrading from Previous Versions
When upgrading to WCA v2.x or later, Anonymous Authentication must be enabled in IIS. Previous versions of WCA had Anonymous Authentication disabled. This change is required for the/status health endpoint to function correctly.

Status Endpoint
The WCA exposes a health endpoint at<hostname>/status that returns OK with HTTP 200 when the WCA application is running correctly. Use this endpoint for monitoring and health checks.
Setup
- Console UI
- Configuration
To create a Microsoft Windows Client Authenticator connector in the Maverics Console:
- Navigate to Identity Fabric in the Console sidebar.
- Click Create and select Microsoft Windows Client Authenticator.
- Enter a Name for the connector.
- Enter the URL of the WCA server — this must match the IIS site binding hostname (e.g.,
https://wca.corp.example.com). - Optionally enter a CA Path if the IIS server uses a self-signed or internal CA certificate.
- Click Save.
Testing
To verify the WCA is working correctly:- Open a browser and navigate to the WCA URL (e.g.,
https://wca.corp.example.com). - Enter your Windows credentials when prompted.
- The landing page displays the authenticated username, confirming that NTLM authentication is functioning.
NTLM Seamless Authentication
By default, browsers prompt users for credentials when accessing the WCA. You can configure browsers to pass Windows credentials automatically for a seamless single sign-on experience.Edge and Chrome
Go to Internet Settings > Local Intranet > Advanced. Under “Add this website to the zone:”, add both the WCA site URL and the application URL.Firefox
- Navigate to
about:configin the Firefox address bar. - Add both the WCA site URL and the application URL (comma-separated) to:
network.automatic-ntlm-auth.trusted-urisnetwork.negotiate-auth.delegation-urisnetwork.negotiate-auth.trusted-uris
- Set
signon.autologin.proxytotrue.
High Availability
WCA requires a Layer 4 (network) load balancer for high availability. Do not use a Layer 7 (application) load balancer — Layer 7 load balancers terminate and re-establish TCP connections, which breaks the multi-step NTLM authentication handshake. Use source IP / destination IP / port tuple affinity (sticky sessions based on client IP) to ensure all packets in an NTLM handshake reach the same backend IIS server.Architecture
The high availability architecture follows this flow: Client Machines → App Load Balancer → Orchestrator(s) → Network Load Balancer (Layer 4) → IIS Server(s) with WCA
Troubleshooting
NTLM authentication fails through a load balancer
NTLM authentication fails through a load balancer
NTLM authentication requires an unbroken TCP connection across multiple request-response rounds. Layer 7 (application) load balancers terminate and re-establish connections, breaking the handshake.Fix: Replace the Layer 7 load balancer with a Layer 4 (network) load balancer. Configure source IP affinity to ensure all packets in a handshake reach the same backend server.
Status endpoint returns 401 or 403
Status endpoint returns 401 or 403
The
/status endpoint requires Anonymous Authentication to be enabled in IIS. This is a common issue when upgrading from WCA versions prior to v2.x.Fix: In IIS Manager, navigate to the WCA application’s Authentication settings and enable Anonymous Authentication.Browser prompts for credentials on intranet
Browser prompts for credentials on intranet
By default, browsers do not automatically send Windows credentials to intranet sites. Users will see a credential prompt on each access.Fix: Configure NTLM seamless authentication in the browser or via Group Policy. See the NTLM Seamless Authentication section above.
WCA installer fails
WCA installer fails
The WCA installer requires the .NET 7.0.13 Windows Server Hosting bundle. If the bundle is not present, the installer will install the bundle for you, but this may fail if there are network or permission issues.Fix: Manually download and install the .NET 7 Windows Server Hosting bundle before running the WCA installer.