Multiple Installation Profiles

Deploy the Right Configuration — Every Time

Ensure every workstation is set up with the correct features, security policies, and integrations from day one, no matter its purpose or environment.

The Problem

In complex enterprise environments, workstations often serve vastly different roles, from shared kiosks to privileged administrative systems. Many operate under restricted connectivity or in air‑gapped networks where uniform policy enforcement becomes difficult. Without predefined installation profiles, administrators must manually configure each device, introducing inconsistency and human error. This manual effort slows deployments, weakens compliance, and increases the risk of configuration drift across fleets. Over time, the lack of automation leads to higher IT overhead and reduced security assurance.

The Solution

Credenti’s Multiple Installation Profiles let administrators define and deploy workstation configurations that automatically apply the right features and policies during setup. By replacing manual configuration with predefined profiles, organizations achieve consistent, secure, and policy-driven deployments at scale. Each profile can include feature toggles, UAC protection, SSO, offline mode, and directory-linked identity mappings. This structured approach eliminates configuration drift, accelerates readiness, and ensures every workstation is deployed precisely for its role and compliance requirements.

Illustration of Credenti’s Multiple Installation Profiles showing two workstation configuration profiles side by side. Each profile displays different installer settings such as feature toggles, UAC protection, SSO, offline mode, and directory-linked identity mappings. The illustration demonstrates how Credenti automatically applies the correct policies during setup, enabling consistent, secure, and role-specific workstation deployments while eliminating configuration drift.

Example: Credenti supports flexible offline authentication modes that can be tailored for different operational needs, allowing secure access even when devices are disconnected from the network.

Common Offline Modes  – Define authentication rules for devices that can’t connect to the internet:

  • Fail Open – Allow login without MFA.
  • Fail Close – Block login attempts.
  • Fail Open with Offline Factors – Require pre-enrolled offline authentication.
  • Fail Open with Admin Code – Require an offline one-time admin override code.

Where It Matters

Frontline Workstations

Deploy shared or kiosk-style workstations preconfigured with limited access, autologon, and offline factors for reliability in field or retail environments. This helps maintain productivity even without IT intervention and ensures users can securely log in with minimal friction.

Privileged Access Machines

Apply stricter security settings such as UAC MFA enforcement, VPN enforcement, and public key pinning to protect high-value systems. These profiles ensure administrators and IT operators access sensitive environments only under controlled and auditable conditions.

Offline or Air-Gapped Environments

Enable offline authentication modes like Fail Open with Offline Factors or Fail Open with Admin Code to keep users productive without compromising control. This makes it ideal for military, industrial, or remote facilities where connectivity is limited or unavailable.

Multi-Region or Distributed Enterprises

Localize installations with regional helpdesk info, custom language settings, and region-specific MFA modes — ensuring user familiarity and compliance worldwide. It helps organizations maintain a unified experience while respecting localization and data sovereignty requirements.

The Credenti Differentiator


Profile-Driven Control

Define and deploy multiple installation profiles to ensure every system starts with the correct configuration — no manual setup required. This automation reduces errors, accelerates deployment, and guarantees policy compliance across every endpoint.

Granular Policy Application

From offline policies to credential provider whitelisting, tailor every aspect of the install to match the workstation’s risk level and use case. This granular control enables organizations to scale deployments without sacrificing flexibility or security.

Seamless Integration with Identity Providers

Through User Transformation Mapping (UTM) and User Provisioning Service (UPS), Credenti ensures username mapping, account creation, and synchronization remain consistent across all systems. This tight coupling eliminates mismatched credentials and supports seamless first login experiences.

Built for Complex Environments

Whether connected, disconnected, or regulated, Credenti’s flexible deployment options make it easy to standardize configuration management at scale. This ensures that every machine, regardless of where it operates, adheres to the same high security and compliance standards.

Deploy Smarter with Credenti

Eliminate repetitive setup, reduce human error, and strengthen security across all endpoints — from connected desktops to offline machines.