Local user MFA for Windows

Local user MFA in ADSelfService Plus strengthens access security for local user accounts that are created and stored directly on a Windows machine, rather than in a centralized directory like Active Directory. These accounts authenticate using locally stored credentials and are commonly used in workgroup environments, on standalone or DMZ systems, and for local administrative tasks on domain-joined endpoints.

ADSelfService Plus enhances the security of these accounts by enforcing MFA for key Windows login scenarios, including:

Machine-based MFA for computers with local users can be enabled for the following types of machines:

How local user MFA works

When local user MFA is enabled, ADSelfService Plus creates a virtual domain named localusers.domain. All local user accounts and workgroup machines with the ADSelfService Plus login agent installed are grouped under this virtual domain to facilitate management. The authenticaton workflow proceeds as follows:

How local user MFA works in ADSelfService Plus

Fig.1: How local user MFA works in ADSelfService Plus

Prerequisites

Ensure you meet the following requirements before configuring local user MFA.

Limitations

General:

Enrollment:

Offline MFA:

Configuration instructions

Step 1: Enable local user MFA

  1. Log in to the ADSelfService Plus admin portal.
  2. Navigate to Configuration > Self-Service > Multi-Factor Authentication.
  3. Click Local User MFA Settings at the top-right of the page.
  4. In the pop-up that appears, check Enable local user MFA.
  5. Click Save.
  6. Enabling local user MFA in ADSelfService Plus

    Fig.2: Enabling local user MFA in ADSelfService Plus.

Step 2: Configure MFA authenticators for local users

  1. Navigate to Configuration > Self-Service > Multi-factor Authentication.
  2. From the Choose the Policy drop-down, select localusers.domain.
  3. Click the Authenticators Setup tab and set up the authenticators required for local user MFA.
  4. Configuring authenticators for local user MFA

    Fig.3: Configuring authenticators for local user MFA.

    ADSelfService Plus supports the following authenticators for local user MFA:

    Online local user MFA

    • Security Questions and Answers
    • Email Verification
    • SMS Verification
    • Google Authenticator
    • Microsoft Authenticator
    • Duo Security
    • RSA SecurID
    • Zoho OneAuth TOTP
    • Custom TOTP Authenticator

    Offline local user MFA

    • Google Authenticator
    • Microsoft Authenticator
    • Zoho OneAuth TOTP
    • Custom TOTP Authenticator

For detailed steps to configure these authentication methods, refer to the Authenticators section.

Step 3: Assign MFA methods for local user logins

  1. Navigate to Configuration> Multi-factor Authentication.
  2. Select localusers.domain from the Choose the Policy drop-down.
  3. Go to the MFA for Endpoints tab.
  4. In the MFA for Machine Login section, select the Enable _ authentication factor(s) for machine logins checkbox. Use the drop-down provided to select the number of authentication factors to be prompted during logins.
  5. Use the Choose Authenticators for Machine login MFA drop-down to select the required authenticators configured in step 2.
  6. (Optional) If you want to configure offline MFA for local users who need to be authenticated when disconnected from the network, check the Choose authenticators for offline MFA checkbox. Select the required authenticators from the drop-down.
  7. Enabling local user MFA for machine login

    Fig.4: Enabling local user MFA for machine login.

To configure MFA for local users during UAC prompts, RDP logins, and system unlocks:

  1. Click Advanced. Go to the Endpoint MFA tab.
  2. Use the drop-down provided for the Enable MFA for _ checkbox to select User Account Control and System unlocks.
  3. Select the Enable MFA for Remote Desktop access during RDP server authentication checkbox.
  4. Click Save.
  5. Policy-based RDP, UAC, and system unlocks MFA configuration for local user MFA

    Fig. 5: Policy-based RDP, UAC, and system unlocks MFA configuration for local user MFA.

To configure device-based local user MFA for machines:

  1. Navigate to Configuration > Administrative Tools > GINA/Mac/Linux (Ctrl+Alt+Del) > GINA/Mac/Linux Installation > Installed Machines.
  2. From the Select Domain drop-down, select Workgroup.
  3. Click Advanced Machine MFA Settings at the bottom-right of the page.
  4. In the Advanced Machine MFA Settings pop-up, select the Windows endpoints you wish to secure with MFA.
  5. Click Save to apply the new configuration.
  6. Enabling device-based local user MFA

    Fig.6: Enabling device-based local user MFA.

Step 4: Install the Windows login agent

The ADSelfService Plus Windows login agent facilitates communication between the local machine and the ADSelfService Plus server. You must install the agent on every target machine.

For domain-joined machines: You can install the ADSelfService Plus login agent on domain-joined Windows machines through the ADSelfService Plus admin portal, manually, via a GPO, or through tools like Microsoft Configuration Manager or ManageEngine Endpoint Central.

For workgroup machines: The login agent cannot be installed or managed on Windows workgroup machines from ADSelfService Plus. You will need to perform these actions manually or through tools like Microsoft Configuration Manager or ManageEngine Endpoint Central.

Step 5: Enroll local users

Once the agent is installed, import and enroll local users as follows:

  1. Navigate to Configuration > Administrative Tools > Quick Enrollment.
  2. From the Select the policy drop-down, choose localusers.domain.
  3. You can enroll users using:
    • CSV import: Navigate to Quick Enrollment > Import enrollment data from CSV file. Learn more
    • Enrolling local users via a CSV file

      Fig.7: Enrolling local users via a CSV file.

    • External database: Navigate to Quick Enrollment > Import enrollment data from external database. Learn more

Users imported via either method will be listed under localusers.domain.

Manage enrolled users via reports

Admins can monitor and audit enrollment, activity, failures, agent deployment, and authenticator usage from the following reports:

Manage agent-installed machines

Once deployed, view all systems with the login agent installed under Configuration > Administrative Tools > GINA/mac/Linux Installation > Installed Machines.

List of workgroup machines with the ADSelfService Plus login agent installed

Fig.8: List of workgroup machines with the ADSelfService Plus login agent installed.

This report can be viewed for both domain-joined and workgroup Windows machines.

Workgroup machines on which the agent is installed will appear under localusers.domain.

Thanks!

Your request has been submitted to the ADSelfService Plus technical support team. Our technical support people will assist you at the earliest.

 

Need technical assistance?

  • Enter your email ID
  • Talk to experts
  •  
     
  •  
  • By clicking 'Talk to experts' you agree to processing of personal data according to the Privacy Policy.

Don't see what you're looking for?

  •  

    Visit our community

    Post your questions in the forum.

     
  •  

    Request additional resources

    Send us your requirements.

     
  •  

    Need implementation assistance?

    Try OnboardPro

     

Copyright © 2025, ZOHO Corp. All Rights Reserved.