Windows provides a modular system login subsystem, called
Winlogon, which can be customized and extended by means of
so-called GINA (Graphical Identification and Authentication)
modules. In Windows Vista and later releases, the GINA modules
were replaced with a new mechanism called credential providers.
The
To activate the
To manually install the
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\GinaDLL
The
To manually install the
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\ Authentication\Credential Providers\{275D3BCC-22BB-4948-A7F6-3A3054EBA92B} HKEY_CLASSES_ROOT\CLSID\{275D3BCC-22BB-4948-A7F6-3A3054EBA92B} HKEY_CLASSES_ROOT\CLSID\{275D3BCC-22BB-4948-A7F6-3A3054EBA92B}\InprocServer32
All default values, the key named
Create the following string and assign it a value of
HKEY_CLASSES_ROOT\CLSID\{275D3BCC-22BB-4948-A7F6-3A3054EBA92B}\InprocServer32\ThreadingModel
To set credentials, use the following command on a running VM:
$ VBoxManage controlvm "Windows XP" setcredentials "John Doe" "secretpassword" "DOMTEST"
While the VM is running, the credentials can be queried by the
For security reasons, credentials are not stored in any persistent manner and will be lost when the VM is reset. Also, the credentials are write-only. There is no way to retrieve the credentials from the host side. Credentials can be reset from the host side by setting empty values.
Depending on the Windows guest version, the following restrictions apply:
For Windows XP guests. The
login subsystem needs to be configured to use the classic
login dialog, as the
Windows Vista, Windows 7, Windows 8,
and Windows 10 guests. The login subsystem does
not support the so-called Secure Attention Sequence,
Automatic login handling of the built-in
Windows Remote Desktop
Service, formerly known as Terminal Services, is
disabled by default. To enable it, create the following
registry key with a
HKEY_LOCAL_MACHINE\SOFTWARE\Oracle\VirtualBox Guest Additions\AutoLogon
The following command forces
$ VBoxManage setextradata "Windows XP" VBoxInternal/Devices/VMMDev/0/Config/KeepCredentials 1
Note that this is a potential security risk, as a malicious application running on the guest could request this information using the proper interface.