How to configure registry settings to bypass Windows login agent authentication
Objective
This article explains how to configure the ADSelfService Plus Windows login agent (GINA/Credential Provider) to allow user logins even when the ADSelfService Plus server is unreachable. This is achieved by updating a specific bypass registry key either manually or via a Group Policy Object (GPO). This ensures users aren't locked out of their machines if the ADSelfService Plus server is down, preventing productivity loss.
Prerequisites
Steps to follow
Manual method : Update settings on a single machine
Press Windows + R to open the Run dialog box.
Type regedit and press Enter.
If prompted by User Account Control, click Yes to allow the Registry Editor to make changes.
Navigate to HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\ZOHO CORP\ADSelfService Plus Client Software.
Locate the key named Bypass.
Modify the value of Bypass to true.
Click OK.
Using a GPO: Update settings on multiple machines
Step 1: Create a new GPO
Log in to the domain controller with administrative credentials.
Press Windows + R to open the Run dialog box.
Type gpmc.msc and press Enter to open the GPMC.
On the left pane, navigate to Group Policy Objects.
Right-click Group Policy Objects and select New.
In the New GPO dialog box, enter a name for the GPO (e.g., ADSSP_LoginAgent_Bypass_Enable).
Click OK.
Step 2: Edit the newly created GPO
Right-click the GPO you just created.
Select Edit. This will open the Group Policy Management Editor.
In the Group Policy Management Editor, navigate to Computer Configuration > Preferences > Windows Settings > Registry.
Step 3: Add the registry entry to enable the login bypass
Right-click Registry on the left pane.
Navigate to New > Registry Item.
In the New Registry Properties window, configure the following:
Click Apply, then OK.
Step 4: Link the GPO
Close the editor.
Link the GPO to the relevant OU or domain.
Apply the GPO to the target machines by running the following:
gpupdate /force Validation and confirmation
Once the GPO is deployed, verify if the above settings are deployed by using the command gpresult /r.
Reboot or log out of a test client machine. Disconnect the machine from the network to simulate server unavailability. When attempting to log in, the MFA prompt should not block the login, and the user should be allowed to log in using cached credentials.
You may also check the registry on the client by navigating to HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\ZOHO Corp\ADSelfService Plus Client Software. Ensure the Bypass key exists and is set to true.
Tips
This setting is a fail-safe mechanism and should be carefully deployed in environments with intermittent connectivity.
Be cautious when configuring this setting in privileged environments to avoid account hacking scenarios.
Consider combining this GPO with monitoring and alerts to identify when fallbacks are being triggered.
How to reach support
If the issue persists, contact our support team here.
New to ADSelfService Plus?
Related Articles
How to disable forced password login when Windows login agent is installed
Objective When the Windows login agent is installed, it enforces password-based login as the default authentication method on the Windows login screen. As a result, other authentication methods such as Windows Hello (Face, PIN) or Smart Card login ...
Sequential ADSelfService Plus Windows agent login installation process
This article highlights the process sequence for the ADSelfService Plus Windows login agent installation via the admin portal and the prerequisites to be addressed to successfully complete each step. Additionally, we're also discussing some common ...
How to reset forgotten Windows passwords from the login screen using ADSelfService Plus
Empowering users with a Windows password reset tool According to recent research, organizations are spending close to one million dollars annually on resolving password-related tickets. This isn’t that surprising, as the Microsoft-approved methods to ...
How to safeguard local and remote Windows logons via ADSelfService Plus' endpoint multi-factor authentication
With cyberattacks on the rise, having only passwords as a defense mechanism is no longer safe. An additional filter is required to restrict unauthorized users. ADSelfService Plus handles this situation by supporting multi-factor authentication (MFA) ...
Updating the ADSelfService Plus Login Agent in Windows
The ADSelfService Plus login agent can be installed on machines running Windows manually, through the ADSelfService Plus admin portal, via GPOs, SCCM, and tools like Endpoint Central. You can update the Windows login agent to its latest version in ...