Protected Group Members and Role Assignments
In environments where SessionLimit is integrated with Active Directory, you may run into the following situation: a user is a member of a protected group, but does not receive SessionLimit role permissions through an AD group.
Protected Group Members Cannot Inherit Roles from Groups
If a user is a member of a Protected Group (SeProtectedGroup), such as:
Domain Admins
Enterprise Admins
Schema Admins
Account Operators
Administrators
Backup Operators
Print Operators
this user will not be able to receive SessionLimit role permissions through an AD group assignment.
Example:
You assign a SessionLimit role to an AD group.
The user is a member of that AD group.
But the user does not see or get the expected SessionLimit permissions.
Reason: this is caused by protected account behavior in Windows, not by a SessionLimit bug.
Correct Solution
For users who are members of protected groups:
Do not rely on AD group-based role inheritance for SessionLimit.
Instead, add the user directly to the desired SessionLimit role.
In other words: AD Group → Role mapping works for normal users, but protected users must be added directly to the role.
Why Does This Happen?
For protected accounts, Windows applies additional security restrictions, for example:
Prevents automatic permission inheritance for some scenarios.
Applies SID filtering and token cleanup.
Only trusts explicit (direct) permissions instead of group-based inheritance in certain contexts.
Because of these mechanisms, SessionLimit role permissions:
Can be granted to a protected user via direct role assignment.
Cannot be reliably inherited via group membership.
Important: This is expected behavior in Active Directory and Windows security design. SessionLimit simply reflects what the OS and directory services provide; it does not override protected account handling.
Practical Administration Tips
For any admin-level user, first ask: “Does this account really need to be a member of a protected group (e.g., Domain Admins)?”
Where possible, create a dedicated SessionLimit admin account that is not a member of protected groups.
For accounts that must remain in protected groups (e.g. Domain Admins):
Assign the SessionLimit role directly to the user, not via group.
Troubleshooting Checklist
If a user cannot see or use a SessionLimit role you expect them to have, follow these steps:
Check which AD groups the user is a member of.
Compare those groups with the known protected groups list.
If the user is a member of a protected group:
Add the user directly to the relevant SessionLimit role.
Do not rely on group-based inheritance for this user.
Common Real-World Scenario
Scenario: “John is a member of the Domain Admins group. I added her to the ‘SessionLimitAdmins’ AD group, which is mapped to the SessionLimit Admin role, but she still doesn’t see admin permissions in the UI.”
Resolution:
Add John directly to the SessionLimit Admin role inside the SessionLimit UI.
Summary
Standard (non-protected) user
✅ Works
✅ Works
Protected Group member
❌ Not reliable / Does not work
✅ Works (recommended)
You can place this guide under the “Tips & Tricks” section of your SessionLimit documentation, wiki, or knowledge base.
Last updated