Deployment of GINA using Endpoint Central

Deployment of GINA using Endpoint Central

 Deploying the GINA (Windows) Login Agent via Endpoint Central   

You can use the following steps to deploy the GINA (Windows) login agent through Endpoint Central. This procedure applies to both fresh installations and machines with an existing agent.

Step 1: Create the Software Package  

  1. Go to Software Deployment > Add a Package > Windows.

  2. Fill in the details:

    1. Package Name: ADSelf Service GINA agent

    2. Package Type: MSI/MSP

    3. License Type: Commercial

    4. Locate Installable: Navigate to <Product_installation_folder>/bin and select ADSelfServicePlusClientSoftware.msi.

 

 Step 2: Configure Installation Details     

3. Under Installation > Installation Details, enter the following:

  • MSI/MSP File Name: ADSelfServicePlusClientSoftware.msi

  • MSI/MSP Properties for Installation: SERVERNAME=abc.selfservice.com" PORTNO="9251" PROTOCOL="https" INSTALLATION_KEY="XXXX" BUTTONTEXT="Reset Password / Unlock Account" BYPASS="true" FRAMETEXT="Can't login? Please click on Reset Password/Unlock Account button to reset your password or unlock your account" GINAHOSTEXCLUDE="okta,onelogin" MFAENROLLMENTWINDOWTITLE="Multi-Factor Authentication - Enrollment" MFAWINDOWTITLE="Multi-Factor Authentication" PPE_POPUP="true" PROD_TITLE="ADSelfService Plus" RESTRICTBADCERT="false" SERVERUNREACH="This action requires you to be verified with MFA. Please make sure the ADSelfService Plus server is reachable, has a proper SSL certificate, and connected to the domain controller. " SHOWADSSPLINK="true" SHOWADSSPTILE="true" WINDOWSLOGONTFA="true" MACHINEMFAUSAGESCENARIO="5" OFFLINEMFA="false"

 NoteReplace the paramater values in the installation command above with your application-specific values. You can also add other parameters to the installation command as per your requirements. You can find the full list of available parameters here.

 Step 3: Configure Pre-deployment Activities     

4. Under Pre-deployment Activities, click + > Add Custom Script.

5. Configure the script:

    1. Execute Script from /Run: Command Line

    2. Command Line: msiexec /x {E451B224-C4E6-452E-BB61-2EFD4DC79A9C} /qn

    3. Dependency File: Browse and locate ADSelfServicePlusClientSoftware.msi.

    4. Enable Proceed with the installation even if the above configuration fails.

6. Click Save & Continue.

 Step 4: Deploy the Package     

7. Add the package and deploy it to the target machines.

                  New to ADSelfService Plus?

                    • Related Articles

                    • Configuring MFA for FTD VPN using RADIUS

                      This guide provides steps for enabling multi-factor authentication (MFA) using RADIUS for Cisco's Firepower Threat Defense (FTD) product using ManageEngine ADSelfService Plus' MFA for VPN feature. To enable RADIUS-based authentication for Cisco FTD, ...
                    • Configuring the ADSelfService Plus login agent for machine MFA and password self-service in Linux

                      Securing data and resources on the corporate network is of paramount importance to organizations. In a world where most corporate attacks originate at an endpoint, ADSelfService Plus offers 20 MFA factors to protect endpoints by allowing access only ...
                    • Updating the ADSelfService Plus Login Agent in Windows

                      The ADSelfService Plus login agent can be installed on machines running Windows manually, through the ADSelfService Plus admin portal, via GPOs, SCCM, and tools like Endpoint Central. You can update the Windows login agent to its latest version in ...
                    • Sequential ADSelfService Plus Windows agent login installation process

                      This article highlights the process sequence for the ADSelfService Plus Windows login agent installation via the admin portal and the prerequisites to be addressed to successfully complete each step. Additionally, we're also discussing some common ...
                    • Configuring MFA for Cisco ASA SSL VPN using RADIUS

                      This guide provides steps for enabling multi-factor authentication (MFA) using RADIUS for Cisco's Adaptive Security Appliance (ASA) product using ManageEngine ADSelfService Plus' MFA for VPN feature. To enable RADIUS-based authentication for VPN ...