Share via

Unable to get Entra login to function on Azure Arc enabled Windows Server 2025 hybrid system

Anthony Ries 0 Reputation points
2026-04-15T17:09:06.16+00:00

I have followed all the available documentation, but I am still getting the message when attempting to login to an Arc configured on prem Windows Server 2025 Standard system:

'The sign-in method you're trying to use isn't allowed. Try a different sign-in method or contact your system administrator.'

AAD Login extension is setup

VM Login Administrator permissions setup
Arc Registration complete

Extensions up to date

Conditional Access exception created

Azure VM login Enterprise app access granted

Azure Policy compliance requirement exception created

Server 20205 OS is up to date and activated

Managed Identity is enabled

I've spent days on this and MS will only send me here rather than allow me to submit a support ticket, even though we are paying for it...

Also concerning that I have to use Chrome because edge wouldn't allow me to register for this portal.

Microsoft Security | Microsoft Entra | Microsoft Entra External ID

1 answer

Sort by: Most helpful
  1. Nina Kirschner | SixForOne IT-Service GmbH 0 Reputation points
    2026-04-29T12:33:16.6366667+00:00

    Posting it here too, cause there seem to be multiple threads about this.

    We have spent several days troubleshooting the exact same issue and wanted to share our findings, because this does not appear to be a simple configuration problem.

    Our setup:

    Windows Server 2025 (on‑premises, not Azure VM)

    • Server successfully onboarded to Azure Arc
    • AADLoginForWindows extension installed and healthy
    • Server state:
      • AzureAdJoined = YES
      • DomainJoined = NO
    • Users:
      • Cloud‑only Entra ID users (not synced from AD)
      • Correct Azure RBAC assigned at the Arc machine scope:
        • Virtual Machine User Login
    • Client:
      1. Windows 11, fresh install
      2. Workplace‑joined to the same Entra tenant
      3. RDP using “Use a web account to sign in”

    RDP login opens Microsoft Entra sign‑in

    • Credentials are accepted
    • Login immediately loops back to the sign‑in prompt
    • No interactive error is shown to the user

    Repeated entries in the server log like:

    DoGetToken Diagnostic Event
    Result: 0xC0000022
    Endpoint Uri: https://pas.windows.net/CheckMyAccess
    On-prem tgt error: On-prem configuration is missing
    

    Important: this happens even for cloud‑only users, with no local AD involvement.

    Things we have tested:

    • ✅ Network connectivity to Entra endpoints is fine
    • CheckMyAccess is called, so the server does reach Entra
    • ✅ No Conditional Access policies
    • ✅ Security Defaults disabled
    • ✅ No per-user MFA enforcement
    • ✅ No security-info registration prompt when logging into Office.com
    • ✅ Azure AD Connect put into staging mode (sync fully paused)
    • ✅ Tested with fresh users and fresh clients
    • ✅ No firewall / proxy interference

    Despite all of the above, the login loop continues.

    The RDP login fails after Entra authentication but before a Windows logon token is issued. At that point Windows falls back into an internal “hybrid / on‑prem” code path, which results in the misleading:

    On-prem tgt error: On-prem configuration is missing
    

    Even though the documentation states this is supported, we were not able to make it work in a fully clean configuration.

    Was this answer helpful?

    0 comments No comments

Your answer

Answers can be marked as 'Accepted' by the question author and 'Recommended' by moderators, which helps users know the answer solved the author's problem.