Skip to content

Commit 69f8d53

Browse files
authored
Merge pull request #311 from netwrix/origin/farhan-ndm-cp
docs: add GPO uninstallation to credential provider guide
2 parents cf5fd22 + 52f0ec4 commit 69f8d53

File tree

4 files changed

+172
-240
lines changed

4 files changed

+172
-240
lines changed

docs/directorymanager/11.1/credentialprovider/credentialprovider.md

Lines changed: 55 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -6,24 +6,66 @@ sidebar_position: 70
66

77
# Credential Provider
88

9-
Directory Manager Credential Provider is a web interface for unlocking user accounts and resetting
10-
passwords.
9+
Netwrix Directory Manager Credential Provider (version 3.1.0.0) is a Windows Credential Provider that integrates with Windows login screens to provide self-service password reset and account unlock functionality.
1110

1211
You must install it on each client workstation to make the password reset and account unlock
1312
features available to all users. It provides links on the Windows logon screen, which route users to
1413
the web page(s) where they can unlock their accounts and reset their passwords.
1514

16-
## Files in the download package
15+
## Product Information
16+
17+
- **Version**: 3.1.0.0 (formerly Imanami PasswordCenter Credential Provider)
18+
- **Build Platform**: x64
19+
- **Target OS**: Windows 10/11 (x64)
20+
- **Browser Engine**: Chromium Embedded Framework (CEF) with latest security patches
21+
22+
## Key Components in the Package
1723

1824
The Credential Provider package consists of:
1925

20-
| File and Folder Names | Type of file |
21-
| ------------------ | -------------- |
22-
| NetwrixdirectorymanagerCredentialprovider.msi | Application |
23-
| CPSettings.xml (contains settings for Credential Provider) | File |
24-
| MST Guide | File folder |
25-
| 838060235bcd28bf40ef7532c50ee032.cab | Cab file |
26-
| a35cd6c9233b6ba3da66eecaa9190436.cab | Cab file |
27-
| fe38b2fd0d440e3c6740b626f51a22fc.cab | Cab file |
28-
| Orca-x86_en-us.msi | Orca installer |
29-
| readme.txt | .txt file |
26+
| Component | Description |
27+
| ------------- | ------------- |
28+
| PasswordCenterClientSetup64.msi | MSI installer package |
29+
| Imanami.PasswordCenter.Credential64.dll | Core credential provider DLL |
30+
| GroupIDBrowser.exe | Desktop browser component |
31+
| WebBrowser.exe | CEF-based web rendering engine |
32+
| CPSettings.xml | Configuration file for credential provider settings (optional) |
33+
| Visual C++ 2022 Redistributable (x64) | Required runtime (included in installer) |
34+
| image_yv5_icon.ico | Netwrix branding icon |
35+
| logo.bmp | Enhanced logo bitmap |
36+
37+
## Default Configuration
38+
39+
The credential provider includes the following default settings:
40+
- **Window Title**: "Netwrix Directory Manager"
41+
- **CP Title**: "Netwrix Directory Manager"
42+
- **Forgot Password Text**: "Forgot my password?"
43+
- **Unlock Account Text**: "Unlock my account"
44+
- **Logging**: Disabled by default
45+
- **CEF Log Mode**: Disabled
46+
- **Web View Engine**: CEF (Chromium Embedded Framework)
47+
48+
## System Requirements
49+
50+
- **Operating System**: Windows 10/11 (x64)
51+
- **Platform Toolset**: Visual Studio 2022 (v143)
52+
- **Runtime**: Visual C++ 2022 Redistributable (x64) - included in installer
53+
54+
## Installation Notes
55+
56+
1. The installer requires Windows x64 architecture
57+
2. Visual C++ 2022 Redistributable (x64) is included in the package
58+
3. A system reboot is scheduled after installation to complete credential provider registration
59+
4. Custom CPSettings.xml can be placed in the installation directory for custom configuration
60+
61+
## Configuration Options
62+
63+
The credential provider supports extensive configuration through registry settings and XML configuration:
64+
- Custom password reset URLs
65+
- Custom unlock account URLs
66+
- Proxy server configuration
67+
- Credential provider filtering for specific scenarios
68+
- Custom branding (titles, text, images)
69+
- Logging and debugging options
70+
71+
Registry settings path: `SOFTWARE\Imanami\GroupID\Version 10.0\PasswordCenterClient\Settings`

docs/directorymanager/11.1/credentialprovider/installconfigurecp.md

Lines changed: 117 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -1,10 +1,10 @@
11
---
2-
title: "Netwrix Directory Manager Credential Provider Installation and Configuration"
3-
description: "Installation and Configuration Guide for Netwrix Directory Manager Credential Provider"
2+
title: "Installation and Configuration"
3+
description: "Installation and Configuration"
44
sidebar_position: 1
55
---
66

7-
# Netwrix Directory Manager Credential Provider - Technical Documentation
7+
# Installation and Configuration
88
---
99

1010
## Table of Contents
@@ -111,7 +111,7 @@ This method is suitable for single computers or small deployments where centrali
111111
#### Installation Steps
112112

113113
1. **Download the Installer**
114-
- Obtain `PasswordCenterClientSetup64.msi` (also referred to as `NetwrixdirectorymanagerCredentialprovider.msi` in legacy documentation) from your Netwrix Product Library or link shared by your Account Manager
114+
- Obtain `Netwrix Directory Manager Credential Provider` from your Netwrix Product Library or link shared by your Account Manager
115115
- Verify the file is digitally signed by Netwrix
116116

117117
2. **Run the Installer**
@@ -146,7 +146,7 @@ C:\Program Files\Imanami\Password Center Client (x64)\
146146

147147
After reboot, the Windows logon screen will display with the credential provider active:
148148

149-
![Windows Logon Screen Example]
149+
![Windows Logon Screen](/images/directorymanager/11.1/portal/user/manage/windows_screen.webp)
150150

151151
The logon screen will show:
152152
- **Netwrix logo** (or custom logo if configured)
@@ -255,7 +255,7 @@ If you need to customize the MSI installation (such as pre-configuring the SOURC
255255

256256
**Prerequisites**:
257257
- Orca MSI editor tool (included in Windows SDK)
258-
- MSI package (PasswordCenterClientSetup64.msi or NetwrixdirectorymanagerCredentialprovider.msi)
258+
- MSI package (PasswordCenterClientSetup64.msi)
259259

260260
**Steps to Create MST Transform File**:
261261

@@ -265,21 +265,29 @@ If you need to customize the MSI installation (such as pre-configuring the SOURC
265265
- Run `Orca-x86_en-us.msi` to install Orca
266266
- The Orca console will open after installation
267267

268+
![Orca console](/images/directorymanager/11.1/portal/user/manage/orca_console.webp)
269+
268270
2. **Open MSI in Orca**:
269271
- Launch Orca application
270272
- Click **File****Open**
271273
- Browse to the Credential Provider folder
272-
- Select and open `NetwrixdirectorymanagerCredentialprovider.msi` (or `PasswordCenterClientSetup64.msi`)
274+
- Select and open `PasswordCenterClientSetup64.msi`
275+
276+
![Credential Provider in Orca](/images/directorymanager/11.1/portal/user/manage/cp_loaded.webp)
273277

274278
3. **Create New Transform**:
275279
- From the menu, select **Transform****New Transform**
276280
- This creates a new transform that will store your customizations
277281

282+
![New Transform option](/images/directorymanager/11.1/portal/user/manage/new_transform.webp)
283+
278284
4. **Modify Properties**:
279285
- In the left pane, click **Property**
280286
- The main window displays a list of MSI properties
281287
- Locate the **SOURCEPATH** property in the property list
282288

289+
![Property page](/images/directorymanager/11.1/portal/user/manage/property.webp)
290+
283291
5. **Configure Source Path**:
284292
- Create a shared folder for configuration files:
285293
- Example: `\\fileserver\software\CredentialProvider\Config\`
@@ -290,8 +298,13 @@ If you need to customize the MSI installation (such as pre-configuring the SOURC
290298
- Enter the UNC path to the shared folder: `\\fileserver\software\CredentialProvider\Config\`
291299
- Click **OK**
292300

301+
![Property path](/images/directorymanager/11.1/portal/user/manage/property_path.webp)
302+
293303
6. **Generate Transform File**:
294304
- From the menu, select **Transform****Generate Transform**
305+
306+
![Generate Transform option](/images/directorymanager/11.1/portal/user/manage/generate_transform.webp)
307+
295308
- Save the transform file with a descriptive name (e.g., `CustomConfig.mst`)
296309
- Save it to the same shared folder as the MSI package:
297310
```
@@ -305,7 +318,7 @@ If you need to customize the MSI installation (such as pre-configuring the SOURC
305318
**Files Required in Network Share After This Step**:
306319
```
307320
\\fileserver\software\CredentialProvider\
308-
├── PasswordCenterClientSetup64.msi (or NetwrixdirectorymanagerCredentialprovider.msi)
321+
├── PasswordCenterClientSetup64.msi
309322
├── CustomConfig.mst (your generated transform file)
310323
└── Config\
311324
└── CPSettings.xml (configuration file)
@@ -323,12 +336,27 @@ If you need to customize the MSI installation (such as pre-configuring the SOURC
323336
- Run: `gpmc.msc`
324337
- Or: Start → Administrative Tools → Group Policy Management
325338
339+
![Group Policy Management console](/images/directorymanager/11.1/portal/user/manage/gp_policy.webp)
340+
341+
:::note
342+
Group Policy Management console is available if the Group Policy Management feature has been installed.
343+
:::
344+
326345
2. **Create New GPO**:
327346
- Navigate to your domain or appropriate Organizational Unit (OU)
328347
- Right-click → "Create a GPO in this domain, and Link it here"
348+
349+
![Create a GPO in this domain and link it here option](/images/directorymanager/11.1/portal/user/manage/new_gpo.webp)
350+
329351
- Name: "Deploy Netwrix Credential Provider"
330352
- Click "OK"
331353
354+
**Or**
355+
356+
Right-click the Select **Default Domain Policy** and select **Edit**:
357+
358+
![Edit Default Domain Policy option](/images/directorymanager/11.1/portal/user/manage/edit_gpo.webp)
359+
332360
3. **Link GPO to Target OUs** (if not already linked):
333361
- Right-click the GPO
334362
- Select "Link an Existing GPO"
@@ -348,12 +376,20 @@ If you need to customize the MSI installation (such as pre-configuring the SOURC
348376
- Expand: `Software Settings`
349377
- Click: `Software installation`
350378
379+
![New Package option](/images/directorymanager/11.1/portal/user/manage/software_installation.webp)
380+
381+
:::note
382+
This documentation describes steps for editing the default policy.
383+
:::
384+
351385
3. **Add New Package**:
352386
- Right-click in the right pane → New → Package
353387
- Navigate to the network share: `\\fileserver\software\CredentialProvider\`
354388
- Select: `PasswordCenterClientSetup64.msi`
355389
- **Important**: Use UNC path, not mapped drive letter
356390
391+
![Deploy Software](/images/directorymanager/11.1/portal/user/manage/deploy_cp.webp)
392+
357393
4. **Choose Deployment Method**:
358394
- Dialog appears: "Deploy Software"
359395
- Select: **"Assigned"** (recommended)
@@ -378,6 +414,9 @@ If you selected "Advanced" in step 3.4, configure additional options:
378414
If you created an MST transform file using Orca (see section 1A above), apply it here:
379415
380416
- Click the **Modifications** tab
417+
418+
![Modifications tab](/images/directorymanager/11.1/portal/user/manage/modification_tab.webp)
419+
381420
- Click **Add** button
382421
- Browse to the network share where you saved the .mst file
383422
- Select your transform file (e.g., `CustomConfig.mst`)
@@ -530,6 +569,8 @@ Once the GPO is configured and linked, client machines within the scope of the p
530569
- "Unlock Account" link
531570
- Custom title text under the logo
532571

572+
![Windows Logon screen](/images/directorymanager/11.1/portal/user/manage/windows_screen.webp)
573+
533574
The credential provider is now active and ready for use on client workstations.
534575

535576
#### Troubleshooting GPO Deployment
@@ -2886,6 +2927,73 @@ msiexec /x {4C3F32FA-8AAE-41B7-806E-195782B986D5} /quiet /norestart
28862927
msiexec /x "C:\Path\To\PasswordCenterClientSetup64.msi" /quiet /norestart
28872928
```
28882929

2930+
**Method 4: Uninstall via Group Policy Object**
2931+
2932+
For enterprise environments where the credential provider was deployed via GPO:
2933+
2934+
1. **Open Group Policy Management**:
2935+
- Run: `gpmc.msc`
2936+
- Or: Start → Administrative Tools → Group Policy Management
2937+
2938+
2. **Locate and Edit the GPO**:
2939+
- Right-click the GPO that contains the credential provider deployment (e.g., "Deploy Netwrix Credential Provider" or "Default Domain Policy")
2940+
- Select **Edit**
2941+
- The Group Policy Management Editor opens
2942+
2943+
3. **Navigate to Software Installation**:
2944+
- Expand: `Computer Configuration`
2945+
- Expand: `Policies`
2946+
- Expand: `Software Settings`
2947+
- Click: `Software installation`
2948+
2949+
4. **Remove the Package**:
2950+
- Right-click the Credential Provider package
2951+
- Point to **All Tasks**
2952+
- Click **Remove**
2953+
2954+
5. **Select Removal Method**:
2955+
- In the "Remove Software" dialog box:
2956+
- Select: **"Immediately uninstall the software from users and computers"**
2957+
- Click **OK**
2958+
2959+
6. **Close the Editor**:
2960+
- Click **Close** to close the Group Policy Object Editor
2961+
2962+
7. **Client Workstation Removal Process**:
2963+
- When client workstations restart, the GPO (now without the Credential Provider) is applied
2964+
- This removes the installed Credential Provider from all client workstations
2965+
- **Important**: Once the software is removed, users must restart the workstation **again** to remove the links from the Windows logon screen
2966+
2967+
**Force Immediate Removal on Specific Computers**:
2968+
2969+
On client computers, administrators can force policy update:
2970+
```cmd
2971+
gpupdate /force /boot
2972+
```
2973+
2974+
**Verify Removal on Client Machines**:
2975+
2976+
Check if credential provider has been uninstalled:
2977+
```powershell
2978+
Get-WmiObject -Class Win32_Product | Where-Object {$_.Name -like "*Credential*"}
2979+
```
2980+
2981+
Or check registry:
2982+
```cmd
2983+
reg query "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Authentication\Credential Providers\{c8765b62-7058-4d7f-9421-11a75d623206}"
2984+
```
2985+
2986+
If registry key doesn't exist, uninstallation was successful.
2987+
2988+
**Monitoring Uninstallation Status**:
2989+
2990+
Check GPO application results:
2991+
```cmd
2992+
gpresult /h gpreport.html
2993+
```
2994+
Review the HTML report to verify the software removal policy was applied.
2995+
2996+
28892997
---
28902998

28912999
### Rollback Scenario 3: Emergency Removal (System Locked Out)
@@ -3237,4 +3345,4 @@ Complete list of common Windows credential provider CLSIDs for filtering:
32373345

32383346
**Document End**
32393347

3240-
*For the latest version of this documentation, visit: https://www.netwrix.com/groupid-credential-provider-docs*
3348+

0 commit comments

Comments
 (0)