Support & frequently asked questions.

The questions our engineers answer most often. If yours isn't here, write to info@codeb.io — a human responds within one business day.

How support works

A person reads what you send.

No bots between you and us

No AI chatbot. No deflection layer. No ticket-into-the-void. Your email lands in a real inbox watched by engineers who can actually fix the problem.

Phones answered by a person

Call our German numbers during CET business hours and someone picks up. No phone tree, no queue music, no menu numbers to type.

Email reply target: 1 business day  ·  Phones: Mon–Fri, CET

Product overview

What is the CodeB Credential Provider V2?

It is a standalone .NET library that plugs into the Windows logon screen via Microsoft's Credential Provider API. Where Windows ships with a single password tile, CodeB adds a tile that accepts NFC cards, RFC 6238 TOTP codes, X.509 PKI smartcards and USB memory tokens — and it can replace the password tile entirely when policy demands it.

How is it different from a typical MFA add-on?

Most MFA tools sit on top of an existing password logon. CodeB is the logon itself. It implements the ICredentialProviderCredential2 interface and ships with an integrated Credential Provider Filter, which means it can hide the Microsoft Password Provider tile rather than just adding a second factor next to it. That distinction matters at audit time.

Do I still need Active Directory? Or can I use Entra ID only?

Either, or both. CodeB supports local accounts, Active Directory accounts and Microsoft Entra ID accounts on the same workstation. Hybrid environments are the most common deployment shape we encounter.

What else is bundled with the Credential Provider V2?

Two add-ons travel with the CP V2 licence at no extra cost: CodeB Web SSO, a managed browser extension for Edge and Chrome that fills usernames, passwords and TOTP codes into web apps (and into legacy Windows / Java apps such as T2med) without ever exposing credentials to page JavaScript, and CodeB Desktop Switcher, a hotkey-driven tool that swaps your desktop files, icon positions and per-monitor wallpapers for a clean profile before you share your screen. Either can be licensed standalone if you already use a different desktop logon stack.

Tokens & compatibility

Which tokens are compatible out of the box?

The Credential Provider V2 ships with native support for NFC cards based on MIFARE and DESFIRE, RFC 6238 TOTP codes, X.509 PKI smartcards and software certificates, and plain USB memory sticks for evaluation. Beyond that, a wide library of NFC tokens is supported — including national identity cards, transit cards, bank cards, and the wider DESFIRE family.

What if my users don't have a contactless card?

Issue them a USB memory token for evaluation, or use any RFC 6238 TOTP app — the same identity can log in to Windows whether the card is present or not.

Can I use multiple tokens per user?

Yes. A common pattern is a primary NFC card plus a TOTP app on a phone as a backup for the days someone leaves the card at home. There is no extra licence cost for additional tokens per identity.

Windows & deployment

Which Windows versions are supported?

The CodeB Credential Provider 2 supports every Windows edition from Windows 8 onward, including Windows 8.1, 10, 11 and the corresponding Windows Server releases up to Server 2025. Pre-Windows 8 systems are out of scope for the current Credential Provider V2 build.

How is CodeB rolled out across many workstations?

CodeB ships as a command-line installer. An MSI package is available on request. The Credential Provider configures via registry policy, so any tool that can write to the registry — Group Policy, SCCM, Ansible, PowerShell DSC, hand-crafted .reg files — can deploy it. We do not currently ship our own ADMX templates; the registry keys are short and documented in the install guide.

Does smartcard logon forward across RDP?

Yes. The Windows smartcard channel is forwarded over RDP into hosted desktops, including Azure Virtual Desktop. For AVD specifically you will typically pair CodeB with a KDC proxy so that the PKINIT exchange against the domain controller can complete from clients without line-of-sight to AD.

Does CodeB need an internet connection or a cloud service?

No internet connection or cloud service is required. Every component — the Credential Provider, the audit log and the Web SSO endpoint — runs on your own infrastructure. There is no SaaS control plane to authenticate against. The product is deployed and used regularly in fully air-gapped defence and OT networks where an internet connection isn't available at all.

Security hardening

How do I prevent users from falling back to a password?

In a typical hardened setup the Microsoft Password Provider is hidden via the built-in CodeB Credential Provider Filter, not disabled outright. Disabling the Microsoft Password Provider system-wide can have unwanted side effects on Windows internals; hiding it via the filter cleanly removes the tile from the LogonUI without touching anything underneath. The same filter stops other providers from advertising themselves to LogonUI.

Are audit events forwarded somewhere I can search?

The Identity platform (Enterprise tier and above) emits structured logon, lock, unlock and elevation events over syslog and via direct SIEM connectors — Splunk, Sentinel, Elastic and the open syslog spec. The audit log itself is tamper-evident: each entry is chained, so removed or altered events show up.

Is CodeB FIPS 140-2 enforceable?

Yes — and uniquely so. The Credential Provider V2 is written in 100 % managed .NET code, which means it routes its cryptography through the Windows CNG layer. When you turn on the Group Policy setting “System cryptography: Use FIPS compliant algorithms for encryption, hashing, and signing”, Windows itself enforces FIPS 140-2 against every crypto call the credential provider makes.

Every other Windows credential provider we are aware of is built in native code with its own crypto path, which cannot be enforced via that policy. If you operate in a FIPS-mandated environment, CodeB lets you tick one GPO box and have the operating system guarantee compliance — no signed letters of attestation required.

Support & licensing

What does a CodeB licence look like commercially?

Per-seat, billed annually, with multi-year options. A seat is one user identity regardless of how many devices that identity logs into. See the pricing page for tier detail.

What support do I get?

Every tier includes email support against a documented SLA — 24 hours on Workstation, four hours on Enterprise, one hour on Sovereign. Enterprise and Sovereign customers also get a named engineer who joins your rollout calls.

Can I try CodeB before signing a contract?

Yes — pilots are billed at the Workstation tier price for up to 90 days, even when you're testing Enterprise features. After the pilot, you commit to a tier and term.

How do I report a security issue?

Coordinated disclosure to info@codeb.io. We follow a 90-day coordinated-disclosure window unless an immediate exploitation risk requires a shorter timeline.

Still stuck?

A real engineer reads every support email. Typical first response is well under a working day; complex cases get a Teams or Zoom call.