Local users are accounts that are created and stored directly on a single computer, with no central management through a network domain. These accounts authenticate using locally stored credentials and are only accessible on the machine where they were created. They can exist on both stand-alone and domain-joined systems and are often used for administrative tasks, workgroup environments, or offline systems that do not depend on a centralized directory like Active Directory (AD).
ADSelfService Plus helps administrators secure these local accounts using MFA for various login scenarios, including:
Machine-based MFA for computers with local users can be enabled for the following types of machines:
This guide will take you through the process of enabling, configuring, and overseeing local user MFA:
Before configuring local user MFA, you must first enable it. To do this:

This creates a virtual domain within ADSelfService Plus called localuser.domain into which local users and workgroup (local) Windows computers on which the agent is installed are grouped.
After enabling local user MFA, follow these steps to configure authenticators:

Supported authenticators for Online MFA:
Supported authenticators for offline MFA:

Local user MFA works by linking the Windows machine with the ADSelfService Plus server via the ADSelfService Plus Windows login agent. You must install this agent on every (domain-joined or workgroup) machine where MFA is needed.
Note: To use Local User MFA, the Windows login agent must be version 6.12 or later. If an earlier version is already installed on domain-joined machines, it must be updated to version 6.12.
Installation options:
On domain-joined machines: You can install the ADSelfService Plus login agent on domain-joined Windows machines through the ADSelfService Plus admin portal, manually, via a GPO, or through tools like Microsoft Configuration Manager or ManageEngine Endpoint Central.
On workgroup machines: The login agent cannot be installed or managed on Windows workgroup machines from ADSelfService Plus. You will need to perform these actions manually or through tools like Microsoft Configuration Manager or ManageEngine Endpoint Central.
Note: The login agent cannot be installed or managed remotely on local (non-domain) machines from within ADSelfService Plus.
After the login agent is installed on the relevant Windows machines, you need to import and enroll local user accounts. To do so:

Note: Self-enrollment is currently not supported for Windows local users. Only the admin can enroll local users and manage their enrollment information.
A local user cannot be enrolled if their username is the same as another local user's who is already enrolled.
If the username of a local user who has already been enrolled is changed on the machine, the user must be re-enrolled in the product using the new username.
Admins can track enrollment, activity, failures, agent deployment, and authenticator usage from the following reports:
Once deployed, view all systems with the login agent installed under:Configuration > Administrative Tools > GINA/mac/Linux Installation > Installed Machines.

This report can be viewed for both domain-joined and workgroup Windows machines.
Workgroup machines on which the agent is installed will appear under localusers.domain.
Your request has been submitted to the ADSelfService Plus technical support team. Our technical support people will assist you at the earliest.
Copyright © 2025, ZOHO Corp. All Rights Reserved.