Skip to content

TechDirectArchive

Hands-on IT, Cloud, Security & DevOps Insights

  • Home
  • About
  • Advertise With US
  • Reviews
  • Contact
  • Toggle search form
Home » Windows » Single App Kiosk Mode Configuration using MDM Bridge WMI Provider
  • PrintNightMare 1
    PrintNightmare security update for Windows Server and Windows 10 Security | Vulnerability Scans and Assessment
  • GitLab 1
    How to Setup GitLab Runner on WSL Linux
  • banner 4
    How to Install Windows on VMware Workstation Windows
  • Featured image Unblock Microsoft Store
    How to Unblock Microsoft Store on Windows 11 Windows
  • win 10 login screen
    How to Transfer User Profile to another User in Windows Windows
  • windows 10 2018 insider wallpaper
    How to create an Environment variables in Windows Windows
  • Featured image 8
    How to restore quarantined files in Microsoft Defender Antivirus Security | Vulnerability Scans and Assessment
  • How to Enable High Dynamic Range on Windows 11
    How to Enable High Dynamic Range on Windows 11 Windows

Single App Kiosk Mode Configuration using MDM Bridge WMI Provider

Posted on 24/01/202024/04/2024 Christian By Christian No Comments on Single App Kiosk Mode Configuration using MDM Bridge WMI Provider
Single App Kiosk Mode

In this article, we shall discuss “Single App Kiosk Mode Configuration using MDM Bridge WMI Provider”. Kiosk mode helps you create a dedicated and locked-down user experience on these fixed-purpose devices. Please see , Change SQL Database Collation: ePO events DB and SQL server should match with ePO core collation, Object First OOTBI Appliance Quick Setup, and How to upgrade Trellix ePolicy Orchestrator.

Windows 10 offers a set of different locked-down experiences for public or specialized use: assigned access single-app kiosks, assigned access multi-app kiosks, or shell launchers. 

These same steps apply to create a multi.-app kiosk as well. The XML needs to be updated with more applications under the allowed app (win32, uwp application). In this example, intune, Microsoft configuration designer, and mdm were not used. before we proceed, let’s explain some key terms.

AssignedAccess Configuration Service Provider (CSP)

This is an interface to read, set, modify, or delete configuration settings on the device. These settings map to registry keys or files and this is used to set the device to run in kiosk mode.

Note: Once the CSP has been executed, then the next user login that is associated with the kiosk mode puts the device into the kiosk mode running the application specified in the CSP configuration.

Starting from Windows 10, version 1709, the AssignedAccess configuration service provider (CSP) was expanded to make it easy for Admins to create kiosks that run more than one app.

Currently, as at the time of this writing, Local settings works only with UWP application and NOT with Desktop Application (Win32). (I have previously created an XML, exported but did not work. 

MDM Bridge WMI Provider and Windows 10 MDM Capabilities

Here are the steps needed to deploy a Single App Kiosk on Windows 10 using the MDM Bridge WMI Provider

Step 1: Create a Local Kiosk Account

Ensure the Kiosk account is created before proceeding with these steps. Note: There are different ways to create an account in W10.

Configuration

Now your account is created and can also be verified from here.

Control Panel > User Accounts > user Accounts and click on Manage User Accounts

MDM Bridge

Step 2: Create an XML file or Export the Start layout file and modify it

From the Start menu, right-click on Windows PowerShell. launch PowerShell with Administrators privilege (or else Access will be denied when you run the cmdlets).

At the Windows PowerShell command prompt, enter the following command.

Export-StartLayout –path <path><file name>.xml

Run the following command
- PS C:WINDOWSsystem32> export-startlayout -path .start1.xml 

The output will be saved in this location: C:WindowsSystem32 as shown below.                   
WMI Provider

You can also save this to a different path order than C:WindowsSystem32

Step 3: Let’s build the XML file

Let's discuss the structure of the XML file

A configuration XML can define multiple profiles. Each profile has a unique Id and defines a set of applications that are allowed to run, whether the taskbar is visible, and can include a custom Start layout.

A configuration XML can have multiple config sections. Each config section associates a non-admin user account to a default profile Id.
– Multiple config sections can be associated with the same profile.
– A profile has no effect if it’s not associated with a config section.

<Create the Profile > apps + layout
<Config>=account + Profile ID
Note: The profile are identified by a Unique ID, i.e,
<Profile id=GUID>

At this moment, it is safe to save the file with the .XML extension.

Define the Profile:

There are two types of profiles which are

  • Lockdown Profile and
  • Kiosk Profile.

In this lab demonstration, I will be using the Kiosk profile and this will ensure that the users are only able to the app running on the desktop. The following entries will apply to my chosen profile.

  • Profile Id
  • KioskModeApp

Profile ID

This is a GUID attribute that uniquely identifies a profile. There are different methods for creating a GUID. You can choose to use any, but ensure the GUID is unique throughout the XML file for a specific user.

For my test, I will be using the Desktop Application only. below is how to generate a profile ID (GUID) via PowerShell. This will be the profile id of a user kiosk.

AllowedApps

Here you will have to define a list of applications that are allowed to run (whether Universal Windows Platform (UWP) apps or Windows desktop applications (Win32 Apps).

From Windows 10, version 1809, you can optionally configure a single app in the AllowedApps list to run automatically when the assigned access user account signs in. I configured a single app successfully in the lab.

In the allowed App session, if it is a desktop app, use the app path as shown below

<App DesktopAppPath=”c:windows|system32weather.exe” />
<App DesktopAppPath=”c:windowsProgram FilesNotepadNotepad++.exe” />

But if the App is a UWP app, you should use the AppUsermodelID. See the Application User Model ID: How to find the AUMID of an installed UWP App on how this is performed.

Configure the Application for Auto launch

This sample demonstrates that both UWP and Win32 apps can be configured to automatically launch when assigned access account login. One profile can have at most one app configured for auto-launch.

AutoLaunchArguments are passed to the apps as is and the app needs to handle the arguments explicitly. Therefore, specify the allowed app and set the auto-launch = true in the xml as well.

Hide the Taskbar: I have also decided to hide the taskbar, so I’m including it in the xml file as shown below.

Config configuration

This defines the user account that will be associated with the profile. When this user account signs in on the device, the associated assigned access profile will be enforced, including the allowed apps, Start layout, and taskbar configuration, as well as other local group policies or mobile device management (MDM) policies set as part of the multi-app experience.

And in this area, you specify the Account and the default profile id of the account as shown below. See the URL for more details about the XML file.

<?xml version="1.0" encoding="utf-8" ?>
<AssignedAccessConfiguration
    xmlns="http://schemas.microsoft.com/AssignedAccess/2017/config"
    xmlns:r1809="http://schemas.microsoft.com/AssignedAccess/201810/config"
>
    <Profiles>
        <Profile Id="{xxxx6-4925-xxxxx-0b95xxxxxxxx}">
            <AllAppsList>
                <AllowedApps>
                    <App DesktopAppPath="C:Program FilesNotepad++notepad++.exe" r1809:AutoLaunch="true" />
                </AllowedApps>
            </AllAppsList>
            <StartLayout>
                <![CDATA[<LayoutModificationTemplate xmlns:defaultlayout="http://schemas.microsoft.com/Start/2014/FullDefaultLayout" xmlns:start="http://schemas.microsoft.com/Start/2014/StartLayout" Version="1" xmlns="http://schemas.microsoft.com/Start/2014/LayoutModification">
</LayoutModificationTemplate>
                ]]>
            </StartLayout>
            <Taskbar ShowTaskbar="false"/>
        </Profile>
    </Profiles>
    <Configs>
        <Config>
            <Account>kiosktester</Account>
            <DefaultProfile Id="{xxxx6-4925-xxxxx-0b95xxxxxxxx}"/>
        </Config>
    </Configs>

Next, wrap this in PowerShell by using the MDM bridge to apply the AssignedAccess configuration. Ensure to save this file below with the PowerShell extension, that is .ps1

$nameSpaceName="rootcimv2mdmdmmap"
$className="MDM_AssignedAccess"
$obj = Get-CimInstance -Namespace $namespaceName -ClassName $className
Add-Type -AssemblyName System.Web
$obj.Configuration = [System.Web.HttpUtility]::HtmlEncode(@"
<?xml version="1.0" encoding="utf-8" ?>
<AssignedAccessConfiguration
    xmlns="http://schemas.microsoft.com/AssignedAccess/2017/config"
    xmlns:r1809="http://schemas.microsoft.com/AssignedAccess/201810/config"
>
    <Profiles>
        <Profile Id="{xxxx6-4925-xxxxx-0b95xxxxxxxx}">
            <AllAppsList>
                <AllowedApps>
                    <App DesktopAppPath="C:Program FilesNotepad++notepad++.exe" r1809:AutoLaunch="true" />
                </AllowedApps>
            </AllAppsList>
            <StartLayout>
                <![CDATA[<LayoutModificationTemplate xmlns:defaultlayout="http://schemas.microsoft.com/Start/2014/FullDefaultLayout" xmlns:start="http://schemas.microsoft.com/Start/2014/StartLayout" Version="1" xmlns="http://schemas.microsoft.com/Start/2014/LayoutModification">
</LayoutModificationTemplate>
                ]]>
            </StartLayout>
            <Taskbar ShowTaskbar="false"/>
        </Profile>
    </Profiles>
    <Configs>
        <Config>
            <Account>kiosktester</Account>
            <DefaultProfile Id="{xxxx6-4925-xxxxx-0b95xxxxxxxx}"/>
        </Config>
    </Configs>
</AssignedAccessConfiguration>
"@)
Set-CimInstance -CimInstance $obj

The CDATA is used to embed the StartLayout XML. The script must run and will be executed in the system context. So it makes sense to have this script placed in C:WindowsSystem32 location.

Step 4: Configure the MDM Bridge WMI Provider:

This will be used to map the CSP to WMI. Download the PSTools from here. Run PowerShell as an Administrator, set-ExecutionPolicy Unrestricted. This will prevent you from running into errors when using the code.

Single App Kiosk Mode

The command below will resolve the error as shown    

Note: Best practice is to allow the script kiosktester.ps1 to run only in order not to set the global execution policy to unrestricted as shown below.

powershell.exe -ExecutionPolicy Bypass -File .Kiotester.ps1

Furthermore, In the download path oft he PsTool. Enter the command to launch PsExec in CMD or Power Shell as shown below. Below are the two commands that can be run. See how to use the PsExec tool:

psexec.exe -i -s cmd.exe 
psexec.exe -i -s PowerShell.exe

However, Output for PowerShell command: since I will be running a PowerShell script. Moreover, The PSExec tool will connect to your device and run the Powershell command

Single App Kiosk Mode

After the AssignedAccess script has been created in step 3 above, launch in the following ways.

WMI Provider

Ensure to run the script as System and save the PowerShell script to this location as well. When you do not have the account pre-created, you will be prompted with the following error.

Configuration

Note: I have previously created this account, but simulated it to generate this error.

Run the script with the account created. It should be successful.

MDM Bridge

You can use the first three lines of the PS1 script to query the AssignedAccess MDM to ensure that the code has been injected OK, or if you update the code and re-inject and need to check your changes have been accepted. Note:

Check the $Obj variable to confirm. Nonetheless, This will display the Assigned Access Configuration file.

Without following the order, using the object variable will not work and the desired out will not be prompted.

Configuration

Sign out of the current account that is being used to configure the Assigned Access and login as the AssignedAccess user and this will take effect immediately and work as desired.

Note: You can add this PowerShell script to a task sequence on WDS (as a post-installation or custom installation).

I hope you found this article on “Single App Kiosk Mode Configuration using MDM Bridge WMI Provider” very helpful. Please feel free to leave a comment below.

Rate this post

Thank you for reading this post. Kindly share it with others.

  • Click to share on X (Opens in new window) X
  • Click to share on Reddit (Opens in new window) Reddit
  • Click to share on LinkedIn (Opens in new window) LinkedIn
  • Click to share on Facebook (Opens in new window) Facebook
  • Click to share on Pinterest (Opens in new window) Pinterest
  • Click to share on Tumblr (Opens in new window) Tumblr
  • Click to share on Telegram (Opens in new window) Telegram
  • Click to share on WhatsApp (Opens in new window) WhatsApp
  • Click to share on Pocket (Opens in new window) Pocket
  • Click to share on Mastodon (Opens in new window) Mastodon
  • Click to share on Bluesky (Opens in new window) Bluesky
  • Click to share on Threads (Opens in new window) Threads
  • Click to share on Nextdoor (Opens in new window) Nextdoor
Windows Tags:MDM Bridge WMI Provide, Single and multi app kiosk, Single App Kiosk

Post navigation

Previous Post: Application User Model ID: How to find the AUMID of an installed UWP App
Next Post: How to set up a Single App Kiosk Mode Configuration using a Local Account / MDM Bridge WMI Provider

Related Posts

  • Feature image registry editing
    How to Disable and Enable Registry Access on Windows 11 Windows
  • Old Right click Context Menu
    How to Restore Old Right-click Context Menu in Windows 11 Windows
  • xxxxxx 1
    Have the taskbar appear on one or both displays in Windows Windows
  • image 1
    Install and License Devolutions Remote Desktop Manager Mac
  • Windows Container
    How to Install a Windows Server Container Host Containers
  • Featured image BitLocker AES XTX 256
    Enable BitLocker AES-XTX 256 Encryption Security | Vulnerability Scans and Assessment

More Related Articles

Feature image registry editing How to Disable and Enable Registry Access on Windows 11 Windows
Old Right click Context Menu How to Restore Old Right-click Context Menu in Windows 11 Windows
xxxxxx 1 Have the taskbar appear on one or both displays in Windows Windows
image 1 Install and License Devolutions Remote Desktop Manager Mac
Windows Container How to Install a Windows Server Container Host Containers
Featured image BitLocker AES XTX 256 Enable BitLocker AES-XTX 256 Encryption Security | Vulnerability Scans and Assessment

Leave a Reply Cancel reply

You must be logged in to post a comment.

Microsoft MVP

VEEAMLEGEND

vexpert-badge-stars-5

Virtual Background

GoogleNews

Categories

veeaam100

sysadmin top30a

  • PrintNightMare 1
    PrintNightmare security update for Windows Server and Windows 10 Security | Vulnerability Scans and Assessment
  • GitLab 1
    How to Setup GitLab Runner on WSL Linux
  • banner 4
    How to Install Windows on VMware Workstation Windows
  • Featured image Unblock Microsoft Store
    How to Unblock Microsoft Store on Windows 11 Windows
  • win 10 login screen
    How to Transfer User Profile to another User in Windows Windows
  • windows 10 2018 insider wallpaper
    How to create an Environment variables in Windows Windows
  • Featured image 8
    How to restore quarantined files in Microsoft Defender Antivirus Security | Vulnerability Scans and Assessment
  • How to Enable High Dynamic Range on Windows 11
    How to Enable High Dynamic Range on Windows 11 Windows

Subscribe to Blog via Email

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Join 1,836 other subscribers
  • RSS - Posts
  • RSS - Comments
  • About
  • Authors
  • Write for us
  • Advertise with us
  • General Terms and Conditions
  • Privacy policy
  • Feedly
  • Telegram
  • Youtube
  • Facebook
  • Instagram
  • LinkedIn
  • Tumblr
  • Pinterest
  • Twitter
  • mastodon

Tags

Active Directory AWS Azure Bitlocker Microsoft Windows PowerShell WDS Windows 10 Windows 11 Windows Server 2016

Copyright © 2025 TechDirectArchive

 

Loading Comments...
 

You must be logged in to post a comment.