Skip to content

TechDirectArchive

Hands-on IT, Cloud, Security & DevOps Insights

  • Home
  • About
  • Advertise With US
  • Contact
  • Reviews
  • Toggle search form
Home » Windows » How to set up a Single App Kiosk Mode Configuration using a Local Account / MDM Bridge WMI Provider
  • Header picture 1
    Find BIOS Serial Number and System Information on Windows 11 Windows
  • Fixing TPM Vulnerability
    How to fix a vulnerable Trusted Platform Module [TPM] Windows
  • cv
    Add languages to Windows images using DISM and PowerShell Windows Server
  • acctlockout 1
    Configure Local Administrators Account lockout Windows
  • PersonalHow to Create Symbolic Links in Linux
    All You Need to Know About Symbolic Links in Linux Linux
  • macos 10 14
    How to Launch macOS Activity Monitor from the Utility and Terminal Mac
  • windows update 03
    How to target WSUS clients with the registry keys Windows Server
  • Featured image new
    How to find out who restarted Windows Server Windows

How to set up a Single App Kiosk Mode Configuration using a Local Account / MDM Bridge WMI Provider

Posted on 24/01/202006/12/2023 Christian By Christian No Comments on How to set up a Single App Kiosk Mode Configuration using a Local Account / MDM Bridge WMI Provider
KIOSK-AssignedAccess

Assigned Access Configuration Service Provider (CSP) is an interface to read, set, modify, or delete configuration settings on the device. These settings map to registry keys or files and this is used to set the device to run in kiosk mode. In this article, we shall discuss “Single App Kiosk setup using a Local Account / MDM Bridge”. Please see how to Disable or Remove Kiosk Mode Via the Local Settings, and Single App Kiosk Mode: Setup Assigned Access using Local Settings.

Once the CSP has been executed, then the next user login that is associated with the kiosk mode puts the device into the kiosk mode running the application specified in the CSP configuration.

Starting from Windows 10, version 1709, the AssignedAccess configuration service provider (CSP) was expanded to make it easy for Admins to create kiosks that run more than one app.

Currently, as at the time of this writing this article. The Local settings work only with UWP application and NOT with the Desktop Application (Win32). (I have previously created an XML, and exported this, but did not work. 

MDM Bridge WMI Provider and Windows 10 MDM Capabilities

MDM WMI Bridge provider is used to map the CSPs to WMI. It is worth noting that OMA-DM {Open Mobile Alliance (OMA) Device Management (DM)} is the protocol on which Windows 10 MDM is based. 

Therefore, referring to these terms interchangeably consequently has some differences. Technically, one can refer to Windows 10 MDM as OMA-DM. But it becomes clearer to refer to it as Windows 10 MDM.

MDM Bridge WMI Provider provides a bridge to the capabilities of Windows 10 MDM.

When a connection is initiated to the rootcimv2mdmdmmap namespace, this is similar to connecting to the MDM Bridge WMI Provider. 

These Classes in the namespace bundle the Configuration Service Provider (CSP) of Windows 10 MDM. Below are the steps needed to deploy a Single App Kiosk on Windows 10 using the MDM Bridge WMI Provider.

Here are some vital points to note when employing the MDM Bridge WMI Provider

  • When executing the PowerShell script, ensure to run the MDM Bridge WMI Provider with Administrative privilege.
  • Ensure you have the PSTool downloaded because the local system context is required to view and modify the device settings.
  • This can be achieved by running the download path of the PsTool. Enter the command to launch PsExec in MD or Power Shell.
    – psexec.exe -i -s cmd.exe or
    – psexec.exe -i -s PowerShell.exe

Emphasis on the system and user settings cannot be taken for granted. It is necessary to emphasize that, certain user settings won’t show up when connected to the System context, just as specific device settings won’t show up in user settings.

Step 1: Create a Local Kiosk Account

Ensure the Kiosk account is created before proceeding with these steps.

Note: There are different ways to create an account in W10. 
Local Account

Now your account is created and can also be verified from here. From the Control Panel>User Accounts>user Accounts >and click on Manage User Accounts.

 MDM Bridge

Step 2: Create an XML file or Export the Start layout file and modify it

From the Start menu, right-click on Windows PowerShell. Launch PowerShell with administrator privilege (or else Access will be denied when you run the cmdlets).

At the Windows PowerShell command prompt, enter the following command.

Export-StartLayout –path <path><file name>.xml

Run the following command
- PS C:WINDOWSsystem32> export-startlayout -path .start1.xml 

The output will be saved in this location: C:WindowsSystem32 as shown below.                   
WMI Provider

You can also save this to a different path order than C:WindowsSystem32

Step 3: Let’s build the XML file

Let’s discuss the structure of the XML file

A configuration XML can define multiple profiles. Each profile has a unique Id and defines a set of applications that are allowed to run, whether the taskbar is visible, and can include a custom Start layout.

A configuration XML can have multiple config sections. Each config section associates a non-admin user account to a default profile ID.

Multiple config sections can be associated with the same profile. A profile has no effect if it’s not associated with a config section. See more https://docs.microsoft.com/en-us/windows/configuration/lock-down-windows-10-to-specific-apps

<Create the Profile > apps + layout
<Config>=account + Profile ID
Note: The profile are identified by a Unique ID, i.e,
<Profile id=GUID>

At this moment, it is safe to save the file with the .XML extension.

Define the Profile

There are two types of profiles which are 1: Lockdown Profile and 2: Kiosk Profile.

In this lab demonstration, I will be using the Kiosk profile and this will ensure that the users are only able to the app running on the desktop. The following entries will apply to my chosen profile.

  • Profile Id
  • KioskModeApp

Profile ID: This is a GUID attribute that uniquely identifies a profile. There are different methods for creating a GUID. You can choose to use any, but ensure the GUID unique throughout the XML file for a specific user.

For my test, I will be using the Desktop Application only. below is how to generate a profile ID (GUID) via PowerShell. This will be the profile id of a user kiosk.

MDM Bridge

AllowedApps

Here you will have to define a list of applications that are allowed to run (whether Universal Windows Platform (UWP) apps or Windows desktop applications (Win32 Apps).

From Windows 10, version 1809, you can optionally configure a single app in the AllowedApps list to run automatically when the assigned access user account signs in. I configured a single app successfully in the lab.

In the allowed App session, if it is a desktop app, use the app path as shown below

<App DesktopAppPath=”c:windows|system32weather.exe” />
<App DesktopAppPath=”c:windowsProgram FilesNotepadNotepad++.exe” />

But if the App is a UWP app, you should use the AppUsermodelID.

Configure the Application for Auto Launch

This sample demonstrates that UWP and Win32 apps can be configured to launch automatically when assigned access account login. One profile can have at most one app configured for auto-launch.

AutoLaunchArguments are passed to the apps as is and the app needs to handle the arguments explicitly. Therefore, specify the allowed app and set the auto-launch = true in the xml as well.

Hide the Taskbar

I have also decided to hide the taskbar, so I’m including it in the xml file as shown below.

Config configuration

This user account, when signing in on the device, enforces the associated assigned access profile. This includes the allowed apps, Start layout, and taskbar configuration, along with other local group policies or mobile device management (MDM) policies set as part of the multi-app experience.

In this area, you specify the Account and the defaultProfile id of the account as shown below.

See the link below for more details about the XML file https://docs.microsoft.com/en-us/windows/configuration/kiosk-xml

<?xml version="1.0" encoding="utf-8" ?>
<AssignedAccessConfiguration
    xmlns="http://schemas.microsoft.com/AssignedAccess/2017/config"
    xmlns:r1809="http://schemas.microsoft.com/AssignedAccess/201810/config"
>
    <Profiles>
        <Profile Id="{xxxx6-4925-xxxxx-0b95xxxxxxxx}">
            <AllAppsList>
                <AllowedApps>
                    <App DesktopAppPath="C:Program FilesNotepad++notepad++.exe" r1809:AutoLaunch="true" />
                </AllowedApps>
            </AllAppsList>
            <StartLayout>
                <![CDATA[<LayoutModificationTemplate xmlns:defaultlayout="http://schemas.microsoft.com/Start/2014/FullDefaultLayout" xmlns:start="http://schemas.microsoft.com/Start/2014/StartLayout" Version="1" xmlns="http://schemas.microsoft.com/Start/2014/LayoutModification">
</LayoutModificationTemplate>
                ]]>
            </StartLayout>
            <Taskbar ShowTaskbar="false"/>
        </Profile>
    </Profiles>
    <Configs>
        <Config>
            <Account>kiosktester</Account>
            <DefaultProfile Id="{xxxx6-4925-xxxxx-0b95xxxxxxxx}"/>
        </Config>
    </Configs>

Apply the Assigned Access Configuration

Next, wrap this in PowerShell by using the MDM bridge to apply the AssignedAccess configuration. Ensure to save this file below with the PowerShell extension, that is .ps1

$nameSpaceName="rootcimv2mdmdmmap"
$className="MDM_AssignedAccess"
$obj = Get-CimInstance -Namespace $namespaceName -ClassName $className
Add-Type -AssemblyName System.Web
$obj.Configuration = [System.Web.HttpUtility]::HtmlEncode(@"
<?xml version="1.0" encoding="utf-8" ?>
<AssignedAccessConfiguration
    xmlns="http://schemas.microsoft.com/AssignedAccess/2017/config"
    xmlns:r1809="http://schemas.microsoft.com/AssignedAccess/201810/config"
>
    <Profiles>
        <Profile Id="{xxxx6-4925-xxxxx-0b95xxxxxxxx}">
            <AllAppsList>
                <AllowedApps>
                    <App DesktopAppPath="C:Program FilesNotepad++notepad++.exe" r1809:AutoLaunch="true" />
                </AllowedApps>
            </AllAppsList>
            <StartLayout>
                <![CDATA[<LayoutModificationTemplate xmlns:defaultlayout="http://schemas.microsoft.com/Start/2014/FullDefaultLayout" xmlns:start="http://schemas.microsoft.com/Start/2014/StartLayout" Version="1" xmlns="http://schemas.microsoft.com/Start/2014/LayoutModification">
</LayoutModificationTemplate>
                ]]>
            </StartLayout>
            <Taskbar ShowTaskbar="false"/>
        </Profile>
    </Profiles>
    <Configs>
        <Config>
            <Account>kiosktester</Account>
            <DefaultProfile Id="{xxxx6-4925-xxxxx-0b95xxxxxxxx}"/>
        </Config>
    </Configs>
</AssignedAccessConfiguration>
"@)
Set-CimInstance -CimInstance $obj

The CDATA is used to embed the StartLayout XML. The script must run and will be executed in the system context. So it makes sense to have this script placed in C:WindowsSystem32 location.

Step 4: Configure the MDM Bridge WMI Provider

This will be used to map the CSP to WMI. 

Download the PSTools, and run PowerShell as an Administrator. Set-ExecutionPolicy Unrestricted.

This will prevent you from running into errors when using the code.

Single App Kiosk Mode

The command below will resolve the error as shown    

Local Account
Note: Best practice is to allow the script kiosktester.ps1 to run only in order not to set the global execution policy to unrestricted as shown below.

powershell.exe -ExecutionPolicy Bypass -File .Kiotester.ps1

In the download path of the PsTool. Enter the command to launch PsExec in CMD or Power Shell as shown below. See how to use the PsExec tool. Below are the two commands that can be run.
– psexec.exe -i -s cmd.exe
– psexec.exe -i -s PowerShell.exe

MDM Bridge

Output for PowerShell command since I will be running a PowerShell script, The PSExec tool will connect to your device and run the Powershell command

WMI Provider

After the AssignedAccess script has been created in step 3 above. Launch in the following ways

Run the PowerShell script

Ensure to run the script as System and save the PowerShell script to this location as well.

Note: When you do not have the account pre-created, you will be prompted with the following error.

Note: I have previously created this account, but simulated it to generate this error.

Run the script with the account created, it should be successful.

The first three lines of the PS1 script query the AssignedAccess MDM to ensure that the code has been injected successfully or to check if updates to the code have been accepted.

Check the $Obj variable to confirm. This will display the Assigned Access Configuration file.

Without following the order, using the object variable will not work and the desired out will not be prompted.

Sign out of the current account configuring Assigned Access and log in as the AssignedAccess user for immediate and desired results

Note: You can add this PowerShell script to a task sequence on WDS (as a post-installation or custom installation).

I hope you found this article useful on Single App Kiosk setup using a Local Account / MDM Bridge. Please feel free to leave a comment below.

Rate this post

Thank you for reading this post. Kindly share it with others.

  • Share on X (Opens in new window) X
  • Share on Reddit (Opens in new window) Reddit
  • Share on LinkedIn (Opens in new window) LinkedIn
  • Share on Facebook (Opens in new window) Facebook
  • Share on Pinterest (Opens in new window) Pinterest
  • Share on Tumblr (Opens in new window) Tumblr
  • Share on Telegram (Opens in new window) Telegram
  • Share on WhatsApp (Opens in new window) WhatsApp
  • Share on Mastodon (Opens in new window) Mastodon
  • Share on Bluesky (Opens in new window) Bluesky
  • Share on Threads (Opens in new window) Threads
  • Share on Nextdoor (Opens in new window) Nextdoor
Windows Tags:MDM Bridge WMI Provide, Microsoft Windows, Single and multi app kiosk, Single App Kiosk

Post navigation

Previous Post: Single App Kiosk Mode Configuration using MDM Bridge WMI Provider
Next Post: The following error occurred attempting to rename the computer Account already exists

Related Posts

  • Mimikatz hacktool Trillix
    Windows Defender detects Endpoint Security HipHandlers.dll Security | Vulnerability Scans and Assessment
  • Featured image 2
    Microsoft Account Password Reset via Web and Windows Windows
  • Smartscreen defender blocking application
    Unable to run downloaded Programs due to Defender SmartScreen Windows
  • How to use Netstat.exe to confirm which Program uses or blocks a port
    How to use Netstat.exe to confirm which Program uses or blocks a port Linux
  • 2019computers windows 10 window on blue background 131108 29
    This installation package could not be opened: Verify that the package exists and that you can access it Windows
  • Featured image TeamsGif.
    How to fix Microsoft Teams GIFs or Images not working Windows

More Related Articles

Mimikatz hacktool Trillix Windows Defender detects Endpoint Security HipHandlers.dll Security | Vulnerability Scans and Assessment
Featured image 2 Microsoft Account Password Reset via Web and Windows Windows
Smartscreen defender blocking application Unable to run downloaded Programs due to Defender SmartScreen Windows
How to use Netstat.exe to confirm which Program uses or blocks a port How to use Netstat.exe to confirm which Program uses or blocks a port Linux
2019computers windows 10 window on blue background 131108 29 This installation package could not be opened: Verify that the package exists and that you can access it Windows
Featured image TeamsGif. How to fix Microsoft Teams GIFs or Images not working Windows

Leave a Reply Cancel reply

You must be logged in to post a comment.

Microsoft MVP

VEEAMLEGEND

vexpert-badge-stars-5

Virtual Background

GoogleNews

Categories

veeaam100

sysadmin top30a

  • Header picture 1
    Find BIOS Serial Number and System Information on Windows 11 Windows
  • Fixing TPM Vulnerability
    How to fix a vulnerable Trusted Platform Module [TPM] Windows
  • cv
    Add languages to Windows images using DISM and PowerShell Windows Server
  • acctlockout 1
    Configure Local Administrators Account lockout Windows
  • PersonalHow to Create Symbolic Links in Linux
    All You Need to Know About Symbolic Links in Linux Linux
  • macos 10 14
    How to Launch macOS Activity Monitor from the Utility and Terminal Mac
  • windows update 03
    How to target WSUS clients with the registry keys Windows Server
  • Featured image new
    How to find out who restarted Windows Server Windows

Subscribe to Blog via Email

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Join 1,825 other subscribers
  • RSS - Posts
  • RSS - Comments
  • About
  • Authors
  • Write for us
  • Advertise with us
  • General Terms and Conditions
  • Privacy policy
  • Feedly
  • Telegram
  • Youtube
  • Facebook
  • Instagram
  • LinkedIn
  • Tumblr
  • Pinterest
  • Twitter
  • mastodon

Tags

AWS Azure Bitlocker Microsoft Windows PowerShell WDS Windows 10 Windows 11 Windows Deployment Services Windows Server 2016

Copyright © 2025 TechDirectArchive

 

Loading Comments...
 

You must be logged in to post a comment.