Crayonic Credential Manager User Manual
Table of Contents
- Introduction
- Installation
- Getting Started
- Authentication with Entra ID
- Managing Tenant Configurations
- Tenant Configuration Wizard
- Managing Multiple Tenants
- Switching Between Tenants
- Managing Passkeys
- Viewing Existing Passkeys
- Creating Passkeys
- Removing Passkeys
- Provisioning Passkeys on Behalf of Users
- Troubleshooting
- Advanced Configuration
- Frequently Asked Questions
- Technical Reference
Introduction
Crayonic Credential Manager is a powerful tool designed to help administrators manage passkeys for Entra ID (formerly Azure AD) users. With this application, you can:
- View existing passkeys for users
- Create new passkeys on behalf of users
- Remove passkeys that are no longer needed
- Manage passkeys across different Entra ID tenants
This tool is particularly useful for organizations that want to streamline their passwordless authentication deployment by allowing administrators to provision passkeys for users without requiring user intervention.
Installation
System Requirements
- Windows 10 (1903 or later) or Windows 11
- .NET Framework 4.8 or later
- Administrator privileges (for installation)
- Internet connection for Entra ID authentication
- Security key (FIDO2 compatible) for passkey operations
Installation Steps
- Download the latest MSI installer from the official distribution channel
- Run the installer and follow the on-screen instructions
- The application will be installed to
C:\Program Files\Crayonic Credential Manager
by default - Shortcuts will be created in the Start Menu and on the Desktop
Silent Installation
For automated deployment, you can use the following command to install silently:
msiexec /i CrayonicCredentialManager-1.0.0.msi /quiet
Getting Started
Launching the Application
You can launch the application in two modes:
- Standard Mode: Double-click the "Crayonic Credential Manager" shortcut
- This mode provides a simplified interface focused on passkey management
-
Suitable for most administrative tasks
-
Admin Mode: Use the "Crayonic Credential Manager (Admin)" shortcut or run with the
-Admin
parameter - This mode provides access to additional configuration options
- Useful for advanced settings and troubleshooting
User Interface Overview
The application has a simple, intuitive interface with the following main areas:
- Authentication Panel: Connect to Entra ID and manage authentication settings
- User Search: Find users in your Entra ID tenant
- Passkey Management: View, create, and remove passkeys for selected users
- Status Area: View operation status and error messages
Authentication with Entra ID
Prerequisites
Before you can manage passkeys, you need:
- An Entra ID tenant
- An account with appropriate permissions:
- Global Administrator, or
- Authentication Administrator, or
- Privileged Authentication Administrator
Authentication Methods
The application supports two authentication methods:
- Technical User Authentication:
- Uses environment variables for non-interactive authentication
- Suitable for automated scenarios
-
Requires setting up environment variables (see Advanced Configuration)
-
Passkey Authentication:
- Interactive authentication using passkeys
- Requires a user with appropriate permissions
- Provides a seamless authentication experience
Authenticating with Passkey
- Click the "Authenticate with Passkey" button
- The Microsoft authentication dialog will appear
- Follow the prompts to authenticate with your passkey
- Once authenticated, you'll see a success message and your access token information
Tenant Configuration
The application works with any Entra ID tenant, not just Crayonic's tenant:
- Your tenant ID is automatically detected during authentication
- You can view the current tenant ID in the authentication panel
- You can manage multiple tenant configurations in the Tenant Management tab
Managing Tenant Configurations
The Tenant Management feature allows you to configure and manage multiple Entra ID tenants within the application. This is particularly useful for:
- Administrators who manage multiple tenants
- Organizations with development, testing, and production environments
- Consultants who work with multiple client tenants
Tenant Configuration Wizard
The easiest way to set up a new tenant configuration is to use the Tenant Configuration Wizard:
- Navigate to the "Tenant Management" tab in Admin mode
- Click "Launch Configuration Wizard"
- Follow the step-by-step instructions:
- Step 1: Welcome screen with overview
- Step 2: Enter tenant information (name and tenant ID)
- Step 3: Enter authentication details (client ID and secret)
- Step 4: Test the connection to verify settings
- Step 5: Review and complete the configuration
The wizard will guide you through the process and ensure that your tenant configuration is properly set up.
Managing Multiple Tenants
The Tenant Management tab provides a comprehensive interface for managing your tenant configurations:
- View Configurations: See all your configured tenants in a list
- Add Configuration: Manually add a new tenant configuration
- Edit Configuration: Modify an existing tenant configuration
- Delete Configuration: Remove a tenant configuration you no longer need
- Set Default: Designate a tenant as the default for automatic activation on startup
Each tenant configuration includes:
- Name: A friendly name for the tenant
- Tenant ID: The Entra ID tenant ID or name (e.g., contoso.onmicrosoft.com)
- Client ID: The application (client) ID for authentication
- Client Secret: The client secret for authentication
- Default Status: Whether this is the default tenant
Switching Between Tenants
You can easily switch between configured tenants:
- Navigate to the "Tenant Management" tab
- Select the tenant you want to activate from the list
- Click "Activate Selected Tenant"
- The application will switch to the selected tenant and authenticate automatically
You can also specify a tenant to activate when launching the application:
Fido2UI.exe -Tenant "Contoso Tenant"
This will automatically activate the specified tenant configuration on startup.
Managing Passkeys
Viewing Existing Passkeys
To view existing passkeys for a user:
- Ensure you're authenticated with Entra ID
- In the User Search field, enter the user's UPN (e.g., user@domain.com)
- Click "Search" to find the user
- Select the user from the dropdown if multiple users are found
- The user's existing passkeys will be displayed in the passkey list
- You can see details such as:
- Credential ID
- Creation date
- Last used date
- Manufacturer information (if available)
Creating Passkeys
To create a new passkey for a user:
- Search for and select the user as described above
- Ensure a security key is connected to your computer
- Select "login.microsoft.com" as the Relying Party
- Click "Create Passkey"
- Follow the prompts to register the security key
- The new passkey will appear in the passkey list
Important: The passkey is created for the selected Relying Party (RP). For Entra ID applications, use "login.microsoft.com" as the RP.
Removing Passkeys
To remove a passkey:
- Search for and select the user
- Select the passkey you want to remove from the list
- Click "Remove Passkey"
- Confirm the removal when prompted
- The passkey will be removed from the user's account
Note: Removing a passkey is permanent and cannot be undone. The user will no longer be able to authenticate using that passkey.
Provisioning Passkeys on Behalf of Users
One of the key features of Crayonic Credential Manager is the ability to provision passkeys on behalf of users. This is particularly useful for:
- Initial deployment of passwordless authentication
- Replacing lost or damaged security keys
- Onboarding new employees
Prerequisites for Provisioning
- Administrator account with appropriate permissions
- Physical access to the security key
- User account details (UPN)
Provisioning Process
- Authenticate with an administrator account
- Search for the user you want to provision a passkey for
- Connect the security key to your computer
- Select "login.microsoft.com" as the Relying Party
- Click "Create Passkey"
- Follow the prompts to register the security key
- The passkey is now provisioned and ready for the user
Best Practices for Provisioning
- Document the provisioning process for audit purposes
- Inform users when you provision passkeys on their behalf
- Consider implementing a formal handover process for security keys
- Regularly audit passkey assignments to ensure compliance with security policies
Troubleshooting
Common Issues and Solutions
Authentication Failures
Issue: "We couldn't sign you in" error during authentication
Solution: This typically occurs due to a Relying Party (RP) mismatch. Passkeys are bound to specific RPs - a passkey created for Windows login may not work for web applications. Ensure you're using the correct passkey for the authentication context.
Passkey Creation Failures
Issue: "The operation was canceled by the user" when creating a passkey
Solution: Ensure the security key is properly connected and responsive. Try disconnecting and reconnecting the key, or try a different USB port.
Issue: "Access denied" when creating a passkey
Solution: Verify that your account has the necessary permissions in Entra ID. You need Global Administrator, Authentication Administrator, or Privileged Authentication Administrator role.
User Search Issues
Issue: Cannot find a user in the directory
Solution: Ensure you're using the correct UPN format (user@domain.com). Check that the user exists in the current tenant and that your account has permissions to view user information.
Logging and Diagnostics
The application creates log files that can help diagnose issues:
- Location: Log files are stored in the application directory
- Files:
Fido2UI_log.txt
: General application logsEntraIdAuth_log.txt
: Authentication-related logsPasskeyAuth_log.txt
: Passkey operation logs
To enable verbose logging, launch the application in Admin mode and use the logging configuration options.
Advanced Configuration
Environment Variables
For automated or non-interactive authentication, you can set the following environment variables:
ENTRA_TENANT_ID
: Your Entra ID tenant IDENTRA_CLIENT_ID
: Application (client) ID for authenticationENTRA_CLIENT_SECRET
: Client secret for authentication
Example PowerShell script to set these variables:
$env:ENTRA_TENANT_ID = "43256d89-cff8-4cf9-ac27-cde3dd02e6d4"
$env:ENTRA_CLIENT_ID = "16189696-d030-4add-a9c0-f9f7446abb8a"
$env:ENTRA_CLIENT_SECRET = "your-client-secret"
Command-Line Parameters
The application supports the following command-line parameters:
-Admin
: Launch in Admin mode with additional configuration options-Tenant <tenant-name>
: Specify the tenant configuration to activate by name-LogLevel <level>
: Set the logging level (Debug, Info, Warning, Error)
Examples:
# Launch in Admin mode with debug logging
Fido2UI.exe -Admin -LogLevel Debug
# Launch with a specific tenant configuration
Fido2UI.exe -Tenant "Contoso Tenant"
# Combine parameters
Fido2UI.exe -Admin -Tenant "Development Tenant" -LogLevel Info
Configuration File
Advanced settings can be configured in the Fido2UI.exe.config
file:
- Location: In the application installation directory
- Format: XML configuration file
- Settings: Various application settings, logging configuration, etc.
Frequently Asked Questions
General Questions
Q: Can I use this tool with any Entra ID tenant?
A: Yes, the application works with any Entra ID tenant. You can configure multiple tenants in the Tenant Management tab and easily switch between them.
Q: How do I manage multiple tenants?
A: The application includes a Tenant Management feature that allows you to configure, save, and switch between multiple tenant configurations. You can access this feature in the Tenant Management tab when running in Admin mode.
Q: Does this tool work with security keys from any manufacturer?
A: Yes, the application works with any FIDO2-compatible security key, including those from Yubico, Feitian, Thetis, and others.
Q: Can I create passkeys for both Windows login and web applications?
A: Yes, but you need to select the appropriate Relying Party (RP) when creating the passkey. For Entra ID web applications, use "login.microsoft.com" as the RP.
Technical Questions
Q: What API does the application use to manage passkeys?
A: The application uses the Microsoft Graph API to manage passkeys in Entra ID, and the Windows WebAuthn API for local passkey operations.
Q: Can I automate passkey provisioning?
A: Yes, you can use the environment variables for non-interactive authentication and potentially script the application using PowerShell.
Q: Does the application support multi-factor authentication?
A: Yes, the application respects the MFA requirements configured in your Entra ID tenant.
Technical Reference
API Endpoints
The application uses the following Microsoft Graph API endpoints:
/users
: To search for users/users/{id}/authentication/fido2Methods
: To manage FIDO2 security keys (passkeys)
Permissions Required
The application requires the following Microsoft Graph API permissions:
User.Read
: To read the profile of the signed-in userUser.ReadBasic.All
: To search for users in the directoryUserAuthenticationMethod.ReadWrite.All
: To manage authentication methods
Security Considerations
- The application uses secure authentication methods (OAuth 2.0, MSAL)
- Access tokens are stored in memory only and not persisted to disk
- All communication with Microsoft Graph API is encrypted using TLS
- The application follows the principle of least privilege
Relying Party IDs
Understanding Relying Party (RP) IDs is crucial for passkey management:
- Windows Login: Typically uses a Windows-specific RP ID
- Web Applications: Uses the domain name (e.g., "login.microsoft.com")
- Entra ID Applications: Uses "login.microsoft.com" for web authentication
Passkeys are bound to specific RP IDs and cannot be used across different contexts.
© 2025 Crayonic. All rights reserved.