Disable Credential Providers from Windows Logon Screen Using Group Policy

Product: HYPR Workforce Access Client for Windows
Applicable Version(s): HYPR 6.10+

This process requires administrator access to the Windows Group Policy Editor.


  1.  To hide the default Microsoft Windows credential providers after installation of HYPR Workforce Access, a Windows Group Policy setting must be configured using either the local group policy editor (gpedit.msc) or the group policy management console (gpmc.msc):

    • Modify an existing group policy or create a new group policy and go to the Exclude credential providers setting: Computer Configuration | Policies | Administrative Templates | System | Logon | Exclude credential providers

    • Open the Properties of the group policy setting and set the policy to Enabled

  2. Use the Exclude the following credential providers field to exclude specific credential providers. Enter the comma-separated CLSIDs for multiple credential providers to be excluded from use during the authentication process. HYPR requires the smart card credential provider to be available.

  3. On a Windows 10 system with the HYPR Workforce Access Client installed, Windows Password Provider appears next to the HYPR Logon. Smart Card credential provider can be excluded from the login interface using the following string: {8FD7E19C-3BF7-489B-A72C-846AB3678C96}

    Credential Provider


    Smartcard Reader Selection Provider


    Smartcard WinRT Provider
















    Smartcard Credential Provider


    Smartcard Pin Provider


    WinBio Credential Provider






    NGC Credential Provider






  4. To check for additionally installed third-party credential providers, open the registry and browse to the following location:[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Authentication\Credential Providers]

NOTE: Hiding credential providers via group policy also apply to UAC and RunAs authentication dialog boxes

Enabling the Exclude Credential Provider will allow disabling password-based login on the machine level.


Version Date Comment
Current Version (v. 3) Apr 25, 2023 8:47  Nilesh Doiphode
v. 2 May 06, 2022 19:55 Khedron de León
v. 1 Oct 30, 2021 05:15 Nilesh Doiphode
Was this article helpful?
0 out of 1 found this helpful