Contact Sales

To contact our sales team, you can use the form below. Do not use this form for tickets or help desk, click here to create a ticket.

Synchronise and migrate users and workstation between on-prem AD, Entra ID, Google the easy way. Seamlessly Move devices between AD Joined, Hybrid and Entra Joined.
  • Create ticket
  • Home
  • Migration Agent

Entra ID Users Cannot Log On Locally After AD-to-Entra Migration

Standard Entra users are blocked from signing in interactively on a migrated workstation

Written by Jamie Richard

Updated at April 13th, 2026

Contact Sales

To contact our sales team, you can use the form below. Do not use this form for tickets or help desk, click here to create a ticket.

  • Getting Started
  • FAQs
  • API Documentation
  • Integrations
  • Migration Agent
  • Directory Synchronisation
  • Remote DC agent
  • Remote Password Sync Agent
  • Install and Configure
  • Support
  • Complex Expressions
+ More

Table of Contents

Symptom Cause Example: Affected Policy State Solution Important to Note Script Solution Manual Solution GPO may block manual editing of Security Policy Allow Log On Locally Deny Log On Locally

Symptom

After a machine has been successfully migrated from Active Directory to Entra ID (Azure AD joined), standard Entra users are unable to log on to the workstation interactively. The machine appears correctly joined to Entra, but the Windows login screen rejects Entra user credentials.

"The local policy of this system does not permit you to logon interactively."

“The sign-in method you're trying to use isn't allowed. For more info, contact your network administrator.”

Local Logon Blocked: “The sign-in method you're trying to use isn't allowed. For more info, contact your network administrator.”
  • Entra user receives an error or is prevented from signing in at the login screen after migration.
  • The machine is confirmed Entra-joined but local sign-in fails for standard Entra accounts.
  • Entra accounts with local administrator rights can sign in successfully — this can make the issue appear user-specific when it is policy-wide.
  • secpol.msc → User Rights Assignment → Allow log on locally shows legacy AD domain SID entries alongside or in place of well-known local groups.
  • A combination of the above symptoms.

Cause

During the migration from Active Directory to Entra ID, the local security policy on the endpoint retains the original AD group entries under User Rights Assignment → Allow log on locally (SeInteractiveLogonRight). These stale AD SIDs do not resolve on an Entra-joined machine, effectively blocking interactive logon for standard Entra users.

In some cases the BUILTIN\Administrators group remains intact alongside the stale entries. This means local admins and Entra accounts with administrator rights can still sign in, while standard Entra users cannot. This behavior can cause the issue to go undetected initially, or be misdiagnosed as a per-user account problem rather than a policy problem.

Additionally, explicit deny entries may remain under SeDenyInteractiveLogonRight, which can compound the issue.

Entra-joined user accounts are added to the local Users group (S-1-5-32-545) during the Entra join process. Granting this well-known SID interactive logon rights is what restores access for standard users.

Example: Affected Policy State

The screenshot below shows a real-world example of the Allow log on locally policy after a migration where this issue occurred. Three stale S-1-5-21-… AD SIDs are present alongside Administrators. Standard Entra users were blocked from signing in; Entra admin accounts were unaffected because the Administrators group remained.

Original AD SIDs remain in the “Allow log on locally” properties with in secpol.msc

Solution

The SeInteractiveLogonRight and SeDenyInteractiveLogonRight policies can be corrected manually via secpol.msc, or a script can be used to remediate both in a single automated pass.

Important to Note

When performing this procedure, the Allow log on locally policy will be replaced with Windows-standard well-known local group SIDs. If your organization previously managed this policy via Domain GPO or Intune, those policies should re-apply once the machine is fully onboarded to the target directory.

 

Script Solution

Download FixLogonRights.ps1 from the PowerSyncPro GitHub repository.

https://github.com/PowerSyncPro/MigrationAgent/tree/main/login-rights-fix

Run the script as a local administrator from an elevated PowerShell prompt:

.\FixLogonRights.ps1

The script will automatically:

  • Export the current local security policy using secedit
  • Replace SeInteractiveLogonRight with the correct well-known local SIDs
  • Clear SeDenyInteractiveLogonRight to remove any explicit deny entries
  • Re-import the corrected policy scoped to USER_RIGHTS only — no other policy areas are modified
  • Verify the changes were applied and log any mismatches
  • Run gpupdate /target:computer /force to refresh computer policy

Logon rights granted after the script runs:

SID Group Purpose
*S-1-5-32-544 Administrators Local admins
*S-1-5-32-545 Users All local users — covers standard Entra-joined accounts
*S-1-5-32-551 Backup Operators Standard inclusion
Guest Guest Local Guest account

A log is written to C:\Temp\Fix-SeInteractiveLogonRight.log on each run. Check this file to confirm the original values, whether the import succeeded, whether verification passed, and the gpupdate exit status.

Reboot the machine after the script completes before testing Entra user sign-in.


Manual Solution

Perform the following steps from a local administrator account to correct the policy manually.

GPO may block manual editing of Security Policy

When PowerSyncPro support experienced this issue the local security policy was locked down and not modifiable, even as a local administrator.  The scripted solution was designed as a workaround to this limitation.

 

Allow Log On Locally

  • Open Local Security Policy (secpol.msc)
  • Navigate to Security Settings → Local Policies → User Rights Assignment
  • Open Allow log on locally
  • Remove all existing entries, including any S-1-5-21-… AD SIDs
  • Add the following:
    • Administrators (or BUILTIN\Administrators)
    • Users (or BUILTIN\Users)
    • Backup Operators (or BUILTIN\Backup Operators)
    • Guest

Deny Log On Locally

  • In the same User Rights Assignment section, open Deny log on locally
  • Remove all entries so the policy is empty

Reboot the workstation and test Entra user sign-in.

login authentication

Was this article helpful?

Yes
No
Give feedback about this article

Related Articles

  • Office Applications or Outlook failing to log in after migration
  • Migration Agent User Experience - User Comms & Documentation
  • How-To Bulk Migrate Workgroup Joined Endpoints to AD / Entra

Subscribe to Newsletter

Drop your email in the box below to sign up. We promise to keep our updates relevant and useful – and we’ll never share your details.

PowerSyncPro's logo

PowerSyncPro is the ultimate product for easing the pain and frustration during mergers, acquisitions, divestitures, and consolidations.

Terms & Conditions

  • FAQs
  • Privacy Policy
  • Cookies
  • Anti Slavery Notice

PowerSyncPro

  • Case Studies
  • Contact sales
  • Meet the Team
  • EULA

Get Connected

Room 73, Wrest House, Wrest Park, Silsoe, Bedford, England, MK45 4HR
info@powersyncpro.com

Twitter Youtube Linkedin

Expand