7 thoughts on “ADCS – Login Failure: The user has not been granted the logon type at this computer

  1. You are crazy, adding this to Domain Admins destroys the whole purpose of service accounts with least privileges. This is very bad practise.

    • Hi Martin,
      Thanks for the feedback, I had to check this as it was a guest post. The crux of the problem here is, this role is being deployed on a DC, which I would rather not do, but Daniel does specify this. Also the service account does need to be a member of builtin\administrators, and not domain admins. I would rather have the role on a member server and then simply grant ‘log on as a service’ and ‘log on locally’ but the latter is not available on a DC.

      Regards

      • Put the service account into the ‘Server Operators’ group. That group also has log-on-locally permissions on DCs.

      • Hi, the wizard actually tells you what to do. The user account should be added to the IIS_IUSRS group. By default, this group is granted “Log on as a batch job” in the Default Domain Controller Policy. This should be sufficient, no need to add the account to domain admins, enterprise admins or administrators!

        • That does not work. I tried that too, also tried granting other access rights through local security policy for the DC.

          I think key to this would be the fact that it is a DC. DCs have different access rights compared to other domain members.

          The authentication may be a red herring as the svc account only needs to be a member of the IIS_IUSRS local group. So, the service is likely to still operate properly post-configuration if the svc account is removed from the builtin\administrators group.

Leave a Reply

Your email address will not be published. Required fields are marked *