Troubleshoot account sign-in problems with a Microsoft Entra Domain Services managed domain

The most common reasons for a user account that can't sign in to a Microsoft Entra Domain Services managed domain include the following scenarios:

Tip

Domain Services can't synchronize in credentials for accounts that are external to the Microsoft Entra tenant. External users can't sign in to the Domain Services managed domain.

Account isn't synchronized into Domain Services yet

Depending on the size of your directory, it may take a while for user accounts and credential hashes to be available in a managed domain. For large directories, this initial one-way sync from Microsoft Entra ID can take few hours, and up to a day or two. Make sure that you wait long enough before retrying authentication.

For hybrid environments that user Microsoft Entra Connect to synchronize on-premises directory data into Microsoft Entra ID, make sure that you run the latest version of Microsoft Entra Connect and have configured Microsoft Entra Connect to perform a full synchronization after enabling Domain Services. If you disable Domain Services and then re-enable, you have to follow these steps again.

If you continue to have issues with accounts not synchronizing through Microsoft Entra Connect, restart the Azure AD Sync Service. From the computer with Microsoft Entra Connect installed, open a command prompt window, then run the following commands:

net stop 'Microsoft Azure AD Sync'
net start 'Microsoft Azure AD Sync'

Domain Services doesn't have the password hashes

Microsoft Entra ID doesn't generate or store password hashes in the format that's required for NTLM or Kerberos authentication until you enable Domain Services for your tenant. For security reasons, Microsoft Entra ID also doesn't store any password credentials in clear-text form. Therefore, Microsoft Entra ID can't automatically generate these NTLM or Kerberos password hashes based on users' existing credentials.

Hybrid environments with on-premises synchronization

For hybrid environments using Microsoft Entra Connect to synchronize from an on-premises AD DS environment, you can locally generate and synchronize the required NTLM or Kerberos password hashes into Microsoft Entra ID. After you create your managed domain, enable password hash synchronization to Microsoft Entra Domain Services. Without completing this password hash synchronization step, you can't sign in to an account using the managed domain. If you disable Domain Services and then re-enable, you have to follow those steps again.

For more information, see How password hash synchronization works for Domain Services.

Cloud-only environments with no on-premises synchronization

Managed domains with no on-premises synchronization, only accounts in Microsoft Entra ID, also need to generate the required NTLM or Kerberos password hashes. If a cloud-only account can't sign in, has a password change process successfully completed for the account after enabling Domain Services?

  • No, the password has not been changed.
    • Change the password for the account to generate the required password hashes, then wait for 15 minutes before you try to sign in again.
    • If you disable Domain Services and then re-enable, each account must follow the steps again to change their password and generate the required password hashes.
  • Yes, the password has been changed.
    • Try to sign in using the UPN format, such as driley@aaddscontoso.com, instead of the SAMAccountName format like AADDSCONTOSO\deeriley.
    • The SAMAccountName may be automatically generated for users whose UPN prefix is overly long or is the same as another user on the managed domain. The UPN format is guaranteed to be unique within a Microsoft Entra tenant.

The account is locked out

A user account in a managed domain is locked out when a defined threshold for unsuccessful sign-in attempts has been met. This account lockout behavior is designed to protect you from repeated brute-force sign-in attempts that may indicate an automated digital attack.

By default, if there are 5 bad password attempts in 2 minutes, the account is locked out for 30 minutes.

For more information and how to resolve account lockout issues, see Troubleshoot account lockout problems in Domain Services.

Next steps

If you still have problems joining your VM to the managed domain, find help and open a support ticket for Microsoft Entra ID.