Skip to content

Commit 9574a16

Browse files
committed
docs: add GPO uninstallation to credential provider guide
- Added Method 4: Uninstall via Group Policy Object to installconfigurecp.md - Includes step-by-step GPO removal procedure - Added verification commands for client machines - Completes comprehensive guide, enabling deletion of installcp.md and uninstallcp.md
1 parent 4b46679 commit 9574a16

File tree

1 file changed

+113
-5
lines changed

1 file changed

+113
-5
lines changed

docs/directorymanager/11.1/credentialprovider/installconfigurecp.md

Lines changed: 113 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,10 +1,10 @@
11
---
2-
title: "Netwrix Directory Manager Credential Provider Installation and Configuration"
3-
description: "Installation and Configuration Guide for Netwrix Directory Manager Credential Provider"
2+
title: "Installation and Configuration"
3+
description: "Installation and Configuration"
44
sidebar_position: 1
55
---
66

7-
# Netwrix Directory Manager Credential Provider - Technical Documentation
7+
# Installation and Configuration
88
---
99

1010
## Table of Contents
@@ -146,7 +146,7 @@ C:\Program Files\Imanami\Password Center Client (x64)\
146146

147147
After reboot, the Windows logon screen will display with the credential provider active:
148148

149-
![Windows Logon Screen Example]
149+
![Windows Logon Screen](/images/directorymanager/11.1/portal/user/manage/windows_screen.webp)
150150

151151
The logon screen will show:
152152
- **Netwrix logo** (or custom logo if configured)
@@ -265,21 +265,29 @@ If you need to customize the MSI installation (such as pre-configuring the SOURC
265265
- Run `Orca-x86_en-us.msi` to install Orca
266266
- The Orca console will open after installation
267267

268+
![Orca console](/images/directorymanager/11.1/portal/user/manage/orca_console.webp)
269+
268270
2. **Open MSI in Orca**:
269271
- Launch Orca application
270272
- Click **File****Open**
271273
- Browse to the Credential Provider folder
272274
- Select and open `NetwrixdirectorymanagerCredentialprovider.msi` (or `PasswordCenterClientSetup64.msi`)
273275

276+
![Credential Provider in Orca](/images/directorymanager/11.1/portal/user/manage/cp_loaded.webp)
277+
274278
3. **Create New Transform**:
275279
- From the menu, select **Transform****New Transform**
276280
- This creates a new transform that will store your customizations
277281

282+
![New Transform option](/images/directorymanager/11.1/portal/user/manage/new_transform.webp)
283+
278284
4. **Modify Properties**:
279285
- In the left pane, click **Property**
280286
- The main window displays a list of MSI properties
281287
- Locate the **SOURCEPATH** property in the property list
282288

289+
![Property page](/images/directorymanager/11.1/portal/user/manage/property.webp)
290+
283291
5. **Configure Source Path**:
284292
- Create a shared folder for configuration files:
285293
- Example: `\\fileserver\software\CredentialProvider\Config\`
@@ -290,8 +298,13 @@ If you need to customize the MSI installation (such as pre-configuring the SOURC
290298
- Enter the UNC path to the shared folder: `\\fileserver\software\CredentialProvider\Config\`
291299
- Click **OK**
292300

301+
![Property path](/images/directorymanager/11.1/portal/user/manage/property_path.webp)
302+
293303
6. **Generate Transform File**:
294304
- From the menu, select **Transform****Generate Transform**
305+
306+
![Generate Transform option](/images/directorymanager/11.1/portal/user/manage/generate_transform.webp)
307+
295308
- Save the transform file with a descriptive name (e.g., `CustomConfig.mst`)
296309
- Save it to the same shared folder as the MSI package:
297310
```
@@ -323,12 +336,27 @@ If you need to customize the MSI installation (such as pre-configuring the SOURC
323336
- Run: `gpmc.msc`
324337
- Or: Start → Administrative Tools → Group Policy Management
325338
339+
![Group Policy Management console](/images/directorymanager/11.1/portal/user/manage/gp_policy.webp)
340+
341+
:::note
342+
Group Policy Management console is available if the Group Policy Management feature has been installed.
343+
:::
344+
326345
2. **Create New GPO**:
327346
- Navigate to your domain or appropriate Organizational Unit (OU)
328347
- Right-click → "Create a GPO in this domain, and Link it here"
348+
349+
![Create a GPO in this domain and link it here option](/images/directorymanager/11.1/portal/user/manage/new_gpo.webp)
350+
329351
- Name: "Deploy Netwrix Credential Provider"
330352
- Click "OK"
331353
354+
**Or**
355+
356+
Right-click the Select **Default Domain Policy** and select **Edit**:
357+
358+
![Edit Default Domain Policy option](/images/directorymanager/11.1/portal/user/manage/edit_gpo.webp)
359+
332360
3. **Link GPO to Target OUs** (if not already linked):
333361
- Right-click the GPO
334362
- Select "Link an Existing GPO"
@@ -348,12 +376,20 @@ If you need to customize the MSI installation (such as pre-configuring the SOURC
348376
- Expand: `Software Settings`
349377
- Click: `Software installation`
350378
379+
![New Package option](/images/directorymanager/11.1/portal/user/manage/software_installation.webp)
380+
381+
:::note
382+
This documentation describes steps for editing the default policy.
383+
:::
384+
351385
3. **Add New Package**:
352386
- Right-click in the right pane → New → Package
353387
- Navigate to the network share: `\\fileserver\software\CredentialProvider\`
354388
- Select: `PasswordCenterClientSetup64.msi`
355389
- **Important**: Use UNC path, not mapped drive letter
356390
391+
![Deploy Software](/images/directorymanager/11.1/portal/user/manage/deploy_cp.webp)
392+
357393
4. **Choose Deployment Method**:
358394
- Dialog appears: "Deploy Software"
359395
- Select: **"Assigned"** (recommended)
@@ -378,6 +414,9 @@ If you selected "Advanced" in step 3.4, configure additional options:
378414
If you created an MST transform file using Orca (see section 1A above), apply it here:
379415
380416
- Click the **Modifications** tab
417+
418+
![Modifications tab](/images/directorymanager/11.1/portal/user/manage/modification_tab.webp)
419+
381420
- Click **Add** button
382421
- Browse to the network share where you saved the .mst file
383422
- Select your transform file (e.g., `CustomConfig.mst`)
@@ -530,6 +569,8 @@ Once the GPO is configured and linked, client machines within the scope of the p
530569
- "Unlock Account" link
531570
- Custom title text under the logo
532571

572+
![Windows Logon screen](/images/directorymanager/11.1/portal/user/manage/windows_screen.webp)
573+
533574
The credential provider is now active and ready for use on client workstations.
534575

535576
#### Troubleshooting GPO Deployment
@@ -2886,6 +2927,73 @@ msiexec /x {4C3F32FA-8AAE-41B7-806E-195782B986D5} /quiet /norestart
28862927
msiexec /x "C:\Path\To\PasswordCenterClientSetup64.msi" /quiet /norestart
28872928
```
28882929

2930+
**Method 4: Uninstall via Group Policy Object**
2931+
2932+
For enterprise environments where the credential provider was deployed via GPO:
2933+
2934+
1. **Open Group Policy Management**:
2935+
- Run: `gpmc.msc`
2936+
- Or: Start → Administrative Tools → Group Policy Management
2937+
2938+
2. **Locate and Edit the GPO**:
2939+
- Right-click the GPO that contains the credential provider deployment (e.g., "Deploy Netwrix Credential Provider" or "Default Domain Policy")
2940+
- Select **Edit**
2941+
- The Group Policy Management Editor opens
2942+
2943+
3. **Navigate to Software Installation**:
2944+
- Expand: `Computer Configuration`
2945+
- Expand: `Policies`
2946+
- Expand: `Software Settings`
2947+
- Click: `Software installation`
2948+
2949+
4. **Remove the Package**:
2950+
- Right-click the Credential Provider package
2951+
- Point to **All Tasks**
2952+
- Click **Remove**
2953+
2954+
5. **Select Removal Method**:
2955+
- In the "Remove Software" dialog box:
2956+
- Select: **"Immediately uninstall the software from users and computers"**
2957+
- Click **OK**
2958+
2959+
6. **Close the Editor**:
2960+
- Click **Close** to close the Group Policy Object Editor
2961+
2962+
7. **Client Workstation Removal Process**:
2963+
- When client workstations restart, the GPO (now without the Credential Provider) is applied
2964+
- This removes the installed Credential Provider from all client workstations
2965+
- **Important**: Once the software is removed, users must restart the workstation **again** to remove the links from the Windows logon screen
2966+
2967+
**Force Immediate Removal on Specific Computers**:
2968+
2969+
On client computers, administrators can force policy update:
2970+
```cmd
2971+
gpupdate /force /boot
2972+
```
2973+
2974+
**Verify Removal on Client Machines**:
2975+
2976+
Check if credential provider has been uninstalled:
2977+
```powershell
2978+
Get-WmiObject -Class Win32_Product | Where-Object {$_.Name -like "*Credential*"}
2979+
```
2980+
2981+
Or check registry:
2982+
```cmd
2983+
reg query "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Authentication\Credential Providers\{c8765b62-7058-4d7f-9421-11a75d623206}"
2984+
```
2985+
2986+
If registry key doesn't exist, uninstallation was successful.
2987+
2988+
**Monitoring Uninstallation Status**:
2989+
2990+
Check GPO application results:
2991+
```cmd
2992+
gpresult /h gpreport.html
2993+
```
2994+
Review the HTML report to verify the software removal policy was applied.
2995+
2996+
28892997
---
28902998

28912999
### Rollback Scenario 3: Emergency Removal (System Locked Out)
@@ -3237,4 +3345,4 @@ Complete list of common Windows credential provider CLSIDs for filtering:
32373345

32383346
**Document End**
32393347

3240-
*For the latest version of this documentation, visit: https://www.netwrix.com/groupid-credential-provider-docs*
3348+

0 commit comments

Comments
 (0)