Windows local device login
authentik: 2025.12.0+Enterprise
Windows Credential Provider
Windows Credential Provider (WCP) is a component of the authentik Agent that allows logging in to Windows devices using authentik credentials.
Currently, only local login is supported; RDP login is not yet available and is under development.
- WCP is currently only tested on Windows 11 and Windows Server 2022.
- When WCP is enabled, the password of the Windows user account that's used to login is set to a random string.
- WCP can cause issues with user encrypted directories.
- Support with Active Directory has not been confirmed yet.
- Offline login is currently not supported.
Prerequisites
- The authentik Agent (including the WCP component ) deployed on the Windows device. See Deploy the authentik Agent on Windows for more details.
- A Device access group configured with the appropriate user or group bindings. Without this, all login attempts will be denied. See Configure device access below.
How it works
- The system agent requests an authentication and authorization URL from authentik, using its token.
- This URL is opened in a browser which also injects the device token information, allowing authentik to know that the login request is executed on the same machine.
- The end user logs in normally using the standard authentik interface and flows.
- Once finished, the browser is redirected to a well-defined location and uses the token it receives to finish authentication and authorization through the system agent.
How to log in to a Windows device
- On the Windows login screen, click the authentik icon:
- A browser window will open and prompt you for your authentik credentials.
- Once authenticated, you will be logged in to the Windows device.
Configure device access
Local device login requires that the authenticating user is authorized to access the device. Access is controlled via device access groups, which always apply. On Enterprise, direct device bindings (users, groups, or policies bound directly to the device) also affect access. If no device access group or direct binding is configured with the appropriate bindings, all login attempts will be denied.
- In the Admin interface, navigate to Endpoint Devices > Device access groups and click Create.
- Provide a Group name (e.g.
windows-devices) and click Create. - Expand the newly created device access group and click Bind existing Policy / Group / User.
- Select Group and choose a group that contains the users who should be allowed to log in to the device. Alternatively, bind a specific User or a Policy.
- Click Create.
- Navigate to Endpoint Devices > Devices and edit the device for which you want to enable login.
- Set the Access group to the device access group you created.
- Click Update.
You can also assign a device access group during enrollment by selecting a Device group when creating the enrollment token.