How to enable force enrollment of users based on their OU(s) and group(s) using login script in ADSelfService Plus?

How to enable force enrollment of users based on their OU(s) and group(s) using login script in ADSelfService Plus?

Solution

The Force Enrollment using Login Script feature of ADSelfService Plus allows you to forcefully enroll the un-enrolled users with a login script. You can schedule the execution of a login script to enable force enrollment. Only after the enrollment, users can access other resources in their machine. 

This feature also provides you with the ability to decide whether users of the entire domain or that of a selected organisational unit(s) and group(s) would be forced to enroll. This means, with this feature you can craft a strong deployment policy that fits your requirements to a T.

Steps involved:

  • Login to ADSelfService Plus web console with admin credentials.
  • Navigate to Configuration tab → Administrative Tools → Quick Enrollment → Force Enrollment using Logon Script.
  • Enter the Scheduler Name and the Description.
  • Enable this scheduler only for select organizational units (OUs) and groups by selecting a policy from the Select Policy drop-down list.
    Note: To create or edit a policy, navigate to the Configuration tab → Self-Service → Policy Configuration. You can either create a new self-service policy by clicking the +Add New Policy button, or edit the existing default policy. For detailed steps, click here.
  • Enter the Window Title and Window Content.
  • Enter the text you want to be displayed in the Enrollment Button. Example: Enroll Now.
  • Select the Cancellation Button checkbox if you want one in the pop-up, and enter the text you want to be displayed in it. Example: Remind me later.
  • Note: Click Access URL and enter the Server Name and the Port number in which ADSelfService Plus is running. This ensures that when a user tries to enroll, the right server is contacted for the operation.
  • Schedule the frequency in which you want the script to run in the Schedule Frequency field (range: Hourly to Monthly).

    enrollment-reminder

  • Click Save.

You have now successfully set up a scheduler which runs the login script and forces users to enroll if they have not already.


                    New to ADSelfService Plus?

                      • Related Articles

                      • How to enable Partial Enrollment for Active Directory users in ADSelfService Plus

                        Active Directory domain users need to complete enrollment with ADSelfService Plus before they can use the below listed features: Self-service password reset Self-service account unlock Endpoint multi-factor authentication ADSelfService Plus' logon ...
                      • How to enable offline MFA in ADSelfService Plus

                        ManageEngine ADSelfService Plus supports offline multi-factor authentication (MFA) for Windows machine logins, User Account Control (UAC) prompt elevation, and Remote Desktop Protocol (RDP) server authentication when the product server is ...
                      • Sequential ADSelfService Plus Windows agent login installation process

                        This article highlights the process sequence for the ADSelfService Plus Windows login agent installation via the admin portal and the prerequisites to be addressed to successfully complete each step. Additionally, we're also discussing some common ...
                      • Configuring high availability in ADSelfService Plus

                        ADSelfService Plus utilizes automatic failover to support high availability in case of system and product failures. Essentially, this means that when the ADSelfService Plus service on one machine fails, another instance of ADSelfService Plus running ...
                      • How to enable multi-factor authentication for RDP

                        Generally, remote employees use Microsoft Remote Desktop Protocol (RDP) to connect to their work devices from an external network, using only a password to authenticate their devices. This makes RDP-based access highly vulnerable to password-based ...