How to configure URL trust and deploy certificate revocation settings via GPO for the NT AUTHORITY\SYSTEM account
Objective
This article outlines the process of using Group Policy Objects (GPOs) to:
Trust the ADSelfService Plus portal URL for the NT AUTHORITY\SYSTEM account to prevent issues where users are unable to perform password reset, account unlock, or MFA via the Windows login agent directly from the login screen.
Disable certificate revocation checks to prevent delays in launching the Windows login agent, especially in restricted or offline environments.
Prerequisite
Steps to follow
Step 1: Create a new GPO
Log in to the domain controller with administrative credentials.
Press Win+R to open the Run dialog box.
Type gpmc.msc and press Enter to open the Group Policy Management Console.
In the left pane, navigate to Group Policy Objects.
Right-click Group Policy Objects and select New.
In the New GPO dialog box, enter a name for the GPO (e.g., ADSSP_Trust_Settings).
Click OK.
Step 2: Edit the newly created GPO
Right-click the newly created GPO and select Edit.
In the Group Policy Management Editor, navigate to Computer Configuration > Preferences > Windows Settings > Registry.
Step 3: Configure registry settings
a. Trust the ADSelfService Plus URL
Right-click Registry > New > Registry Item.
Configure the following settings in the New Registry Properties window:
Click Apply, then OK.
b. Disable the server certificate revocation check
Right-click Registry in the left pane, then select New > Registry Item.
In the New Registry Properties window, configure the General tab settings as follows:
Action: Create
Hive: HKEY_USERS
Key Path: HKEY_USERS\S-1-5-18\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Value Name: CertificateRevocation
Value Type: REG_DWORD
Value Data: 0 (this value disables the revocation check)
Base: Hexadecimal
Click Apply, then OK.
c. Disable the publisher’s certificate revocation check
Right-click Registry in the left pane, then select New > Registry Item.
In the New Registry Properties window, configure the General tab settings as follows:
Action: Update
Hive: HKEY_USERS
Key Path: HKEY_USERS\S-1-5-18\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing
Value Name: State (auto-populated)
Value Type: REG_DWORD
Value Data: 0x00023E00 (Hex)
Click Apply, then OK.
4. Deploy the GPO
gpupdate /force Validation and confirmation
On a client machine, open Command Prompt and run gpresult /r to verify if the GPO is applied.
Open Registry Editor on the target machine and confirm the following entries exist:
How to reach support
If the issue persists, contact our support team here.
New to ADSelfService Plus?