CodeB Credential Provider V2
A standalone .NET library implementing Microsoft's ICredentialProviderCredential2 interface. Written from scratch in 100 % managed code, with a plugin architecture for custom token and authorisation workflows.
Talk to an engineerWhat it replaces
The Microsoft Password Provider tile. CodeB ships with an integrated Credential Provider Filter so once policy is applied, the password tile disappears entirely.
Heritage
CP V2 is not a v1.0 product. Aloaha built and supported Aloaha Smartlogin for more than two decades — one of the longest-running Windows credential providers on the market. The Credential Provider V2 is its full re-engineering in modern managed code: same operational pedigree, modern architecture, a plugin model that makes new token types easy to add. You are buying twenty years of edge-case knowledge dressed in a current codebase.
FIPS 140-2 enforceable — and unique
Because the Credential Provider V2 is written in 100 % managed .NET code, it honours the standard Windows Group Policy setting “System cryptography: Use FIPS compliant algorithms for encryption, hashing, and signing.” Switch it on and Windows itself enforces FIPS 140-2 against every crypto call CodeB makes — no extra runtime, no parallel crypto library, no trust-us claim. Every other Windows credential provider we know of is built in native code that cannot be enforced this way. If you need a FIPS-compliant logon path, CodeB is the only credential provider that gives you one by ticking a single GPO box.
Two editions, one credential provider
Pick whichever ships best with your deployment model. Both editions sit on top of the same credential provider — the difference is how the supporting helpers are packaged.
All tools in one system-tray application. Required if you need actions on card-remove (auto-lock, screen blank, sign-out). Easier rollout for daily use.
Download System Tray EditionEach feature is shipped as a standalone executable. Admins install exactly the tools they need and nothing they don't — useful when scripted, scheduled or composed into a wider workflow.
Download Tools Edition
Production tip: the System Tray icon can be hidden from end users
by setting the registry value
HKLM\SOFTWARE\WOW6432Node\CodeB\Config\HideSystray. The helper
keeps running — including card-remove actions — but ordinary users can’t see
or misconfigure it. More background:
deployment notes on win-logon.com.
Admin tooling for unattended rollouts
CodeB Admin CLI (CodeBAdminCLI.exe) is a separate
command-line utility for system administrators. It performs the same enrollment
actions the GUI helpers do — link an NFC card to an Active Directory user, store
encrypted credentials, create local soft-tokens, audit assignments, revoke a card
— but unattended, from any batch script, PowerShell pipeline or SCCM task. Rolling
out 500 cards by hand is a week; doing it from a CSV in a loop is an afternoon.
Standalone download. Not bundled with the two editions above — pull it down separately when you need to script enrollment. Requires administrative privileges (writes to AD attributes).
Download CodeB Admin CLISwitches it understands
/add2fa | Link a card serial as a second factor for an AD user. Equivalent to LinkNFC2AD.exe in script form. |
|---|---|
/add2ad | Store encrypted credentials in AD ("Store to AD" enabled). Replaces the manual flow of LinkNFCCard.exe. |
/add2fs | Create an encrypted soft-token locally instead of storing to AD. |
/list2facards | List every card serial currently assigned to a specific user. |
/list2fa | Reverse lookup — given a card serial, find which user owns it. |
/deletecard | Remove the card reference from both the 2FA records and the credential tokens. |
Parameters
/user | Username being managed. |
|---|---|
/domain | Logon domain the user belongs to. |
/password | User's password — required with /add2ad only. |
/cardserial | Unique identifier (UID) of the NFC card. |
/pin | PIN to be assigned to the card for logon verification. |
/action | 1 = lock screen on card removal, 2 = sign user off. |
Example invocations
:: Link a card serial as second factor
CodeBAdminCLI.exe /add2fa /user stefan /domain CodeB /serial AAFFBBCC
:: Store encrypted credentials in AD
CodeBAdminCLI.exe /add2ad /user stefan /domain CodeB /password letmein /serial AAFFBBCC /pin 1234
:: Or store the encrypted credentials locally as a soft-token
CodeBAdminCLI.exe /add2fs /user stefan /domain CodeB /password letmein /serial AAFFBBCC /pin 1234
:: List every card assigned to a user
CodeBAdminCLI.exe /list2facards /user stefan /domain CodeB
:: Reverse lookup: which user owns this card?
CodeBAdminCLI.exe /list2fa /serial AAFFBBFF
:: Revoke a card (clears 2FA + credential token)
CodeBAdminCLI.exe /deletecard /serial AAFFBBFF /user stefan
Admin tip: run the calling shell or scheduled task with elevated privileges — the CLI writes to AD attributes and the credential store. More background and complete reference: CodeB Admin CLI documentation on win-logon.com.
Tokens it accepts
Listed in order of how often we see them deployed.
- NFC contactless cards — the most popular choice. MIFARE Classic, MIFARE DESFIRE EV1/EV2/EV3, and a wide library of contactless cards. Use them as a second factor or to replace the password entirely.
- TOTP per RFC 6238 — 30-second windows, SHA-1 / SHA-256. The second most popular token. Use it as a second factor or to replace the password entirely.
- X.509 PKI smartcards — healthcare, defence and corporate-issued cards. Software certificates also supported. Less commonly deployed; selected where an existing PKI estate is already in place.
- USB memory stick — a quick way to evaluate the product on a workstation without procuring new hardware. Convenient for proof-of-concept; we recommend moving to NFC, TOTP or PKI for production.
Where it runs
| Operating systems | Windows 8, 8.1, 10, 11 · Windows Server 2012 R2 → 2025 (x86 + x64) |
|---|---|
| Account model | Local · Active Directory · Microsoft Entra ID · hybrid |
| Distribution | Command-line installer · deployable via Group Policy or any registry-driven configuration tool · MSI on request |
| Architecture | Built on ICredentialProviderCredential2 with integrated Credential Provider Filter; custom plugin library supported. |
| FIPS 140-2 | Enforceable by Windows Group Policy (managed-code architecture honours “Use FIPS compliant algorithms”). Native-code competitors cannot be enforced this way. |
| Sovereignty | No cloud required · EU product. On-premises only · no SaaS control plane · no cloud or internet connection required to function · air-gap deployable · Aloaha Limited is an EU (Malta) entity outside US CLOUD Act reach |