This article provides instructions on configuring the Entrust MFA Credential Provider and ADSelfService Plus login agent to coexist on Windows systems. This ensures the ADSelfService Plus login agent appears on the Windows login and lock screen, even when the Entrust MFA Credential Provider is installed.
Why is this important?
By default, the Entrust MFA Credential Provider may take precedence, hiding the ADSelfService Plus login agent. This configuration allows both providers to operate seamlessly without conflicts.
Supported OS versions: Windows 10, Windows 11, Server 2016, Server 2019, Server 2022
Administrator privileges on the target Windows machine.
Access to the Windows Registry Editor (regedit.exe).
Open the Registry Editor (regedit.exe) by clicking the Windows icon in the bottom-left corner. Search for Registry Editor in the search bar, then press Enter. You can also find the Registry Editor by navigating to Control Panel > All Control Panel Items > Windows Tools > Registry Editor.
Navigate to HKEY_LOCAL_MACHINE > SOFTWARE > Entrust > WIGL > AllowCPs.
Right-click in the right pane, and select New > String Value.
Name the new value as ADSelfService Plus.
Double click ADSelfService Plus and enter the following value: {B80B099C-62EA-43CD-9540-3DD26AF3B2B0}
Click OK.
Close the Registry Editor.
Step 2: Configure ADSelfService Plus login agent
Open Registry Editor (regedit.exe).
Navigate to HKEY_LOCAL_MACHINE > SOFTWARE > Wow6432Node > ZOHO Corp > ADSelfService Plus Client Software.
Right-click in the right pane and select New > String Value.
Name the new value as WrappingProvider.
Double-click WrappingProvider and enter the following value: {126DA98F-1690-49c1-91A0-D704D7EEAEBB}
Click OK.
Close the Registry Editor.
Step 1: Create a new GPO
Open Group Policy Management Console (GPMC) (gpmc.msc).
Right click the desired OU and select Create a GPO in this domain, and Link it here...
Name the GPO Wrap Entrust MFA with ADSelfService Plus and click OK.
Step 2: Configure Entrust MFA registry settings
Edit the newly created GPO.
Navigate to Computer Configuration > Preferences > Windows Settings > Registry.
Right click and select New > Registry Item.
Configure the settings as follows:
Action: Create
Hive: HKEY_LOCAL_MACHINE
Key Path: SOFTWARE\Entrust\WIGL\AllowCPs
Value Name: ADSelfService Plus
Value Type: String Value
Value Data: {B80B099C-62EA-43cd-9540-3DD26AF3B2B0}
Click OK to save.
Step 3: Configure ADSelfService Plus Registry Settings
Right click again in the Registry section and select New > Registry Item.
Configure the settings as follows:
Action: Create
Hive: HKEY_LOCAL_MACHINE
Key Path: SOFTWARE\Wow6432Node\ZOHO CORP\ADSelfService Plus Client Software
Value Name: WrappingProvider
Value Type: String Value (REG_SZ)
Value Data: {126DA98F-1690-49c1-91A0-D704D7EEAEBB}
Click OK to save.
Step 4: Apply the GPO
Close the Group Policy Editor.
Run the following command on the domain controller to apply the policy immediately:
gpupdate /force Restart the target machines for changes to take effect.
Verify that the ADSelfService Plus Credential Provider is visible alongside the Entrust MFA Credential Provider on the Windows login and lock screens.
Test ADSelfService Plus functionality by performing a password reset or account unlock.
If the ADSelfService Plus login agent does not appear, re-check the registry entries for typos or missing values.
If the Entrust MFA prompts override ADSelfService Plus, confirm that ProvidersWhiteList is correctly set in Entrust MFA’s registry settings.
Ensure the GPO is applied correctly by running gpresult/r on the target machine.
Always backup the registry before making modifications.
Use Group Policy or automated scripts to deploy registry changes on multiple machines.
Test changes on a non-production system before rolling out to all users.