Virtualized Active Directory is ready for Primetime, Part II! In the first of this two-part blog series, I discussed how virtualization-first is the new normal and fully supported; and elaborated on best practices for Active Directory availability, achieving integrity in virtual environments, and making AD confidential and tamper-proof. In this second installment, I’ll discuss the elements of time in Active Directory, touch on replication, latency and convergence; the preventing and mediating lingering objects, cloning and of much relevance, preparedness for Disaster Recovery. Proper Time with Virtualized Active Directory Domain Controllers (AD DC)Time in virtual machines can easily drift if they are not receiving constant and consistent time cycles. Windows operating systems keep time based on interrupt timers set by CPU clock cycles. In a VMware ESXi host with multiple virtual machines, CPU cycles are not allocated to idle virtual machines. To plan for an Active Directory implementation, you must carefully consider the most effective way of providing accurate time to domain controllers and understand the relationship between the time source used by clients, member servers, and domain controllers. The Domain Controller with the PDC Emulator role for the forest root domain ultimately becomes the “master” timeserver for the forest – the root time server for synchronizing the clocks of all Windows computers in the forest. You can configure the PDC to use an external source to set its time. By modifying the defaults of this domain controller’s role to synchronize with an alternative external stratum 1 time source, you can ensure that all other DCs and workstations within the domain are accurate. Why Time Synchronization Is Important in Active DirectoryEvery domain-joined device is affected by time! Ideally, all computer clocks in an AD DS domain are synchronized with the time of an authoritative computer. Many factors can affect time synchronization on a network. The following factors often affect the accuracy of synchronization in AD DS:
Prior to Windows Server 2016, the W32Time service was not designed to meet time-sensitive application needs. Updates to Windows Server 2016 allow you to implement a solution for 1ms accuracy in your domain. ![]() Figure 1: How Time Synchronization Works in Virtualized Environments See Microsoft’s How the Windows Time Service Works for more information. How Synchronization Works in Virtualized EnvironmentsAn AD DS forest has a predetermined time synchronization hierarchy. The Windows Time service synchronizes time between computers within the hierarchy, with the most accurate reference clocks at the top. If more than one time source is configured on a computer, Windows Time uses NTP algorithms to select the best time source from the configured sources based on the computer’s ability to synchronize with that time source. The Windows Time service does not support network synchronization from broadcast or multicast peers. Replication, Latency and ConvergenceEventually, changes must converge in a multi-master replication model… The Active Directory database is replicated between domain controllers. The data replicated between controllers called ‘data’ are also called ‘naming context.’ Only the changes are replicated, once a domain controller has been established. Active Directory uses a multi-master model; changes can be made on any controller and the changes are sent to all other controllers. The replication path in Active Directory forms a ring which adds reliability to the replication. Latency is the required time for all updates to be completed throughout all domain controllers on the network domain or forest. Convergence is the state at which all domain controllers have the same replica contents of the Active Directory database. ![]() Figure 2: How Active Directory Replication Works For more information on Replication, Latency and Convergence, see Microsoft’s “Detecting and Avoiding Replication Latency.” Preventing and Remediating Lingering ObjectsDon’t revert to snapshot or restore backups beyond the TSL. Lingering objects are objects in Active Directory that have been created, replicated, deleted, and then garbage collected on at least the Domain Controller that originated the deletion but still exist as live objects on one or more DCs in the same forest. Lingering object removal has traditionally required lengthy cleanup sessions using various tools, such as the Lingering Objects Liquidator (LoL). Dominant Causes of Lingering Objects
While knowledge of creates and modifies are persisted in Active Directory forever, replication partners must inbound replicate knowledge of deleted objects within a rolling Tombstone Lifetime (TSL) # of days (default 60 or 180 days depending on what OS version created your AD forest). For this reason, it’s important to keep your DCs online and replicating all partitions between all partners within a rolling TSL # of days. Tools like REPADMIN /SHOWREPL * /CSV, REPADMIN /REPLSUM and AD Replication Status should be used to continually identify and resolve replication errors in your AD forest.
System time jump more than TSL # of days in the past or future can cause deleted objects to be prematurely garbage collected before all DCs have inbound replicated knowledge of all deletes. The protection against this is to ensure that:
USN rollbacks are caused when the contents of an Active Directory database move back in time via an unsupported restore. Root causes for USN Rollbacks include:
![]() Figure 3: USN Rollbacks – How Snapshots Can Wreak Havoc on Active Directory CloningYou should always use a test environment before deploying the clones to your organization’s network. DC Cloning enables fast, safer Domain Controller provisioning through clone operation. When you create the first domain controller in your organization, you are also creating the first domain, the first forest, and the first site. It is the domain controller, through group policy, that manages the collection of resources, computers, and user accounts in your organization. Active Directory Disaster Recovery Plan: It’s a MustBuild, test, and maintain an Active Directory Disaster Recovery Plan! AD is indisputably one of an organization’s most critical pieces of software plumbing and in the event of a catastrophe – the loss of a domain or forest – its recovery is a monumental task. You can use Site Recovery to create a disaster recovery plan for Active Directory. Microsoft Active Directory Disaster Recovery Plan is an extensive document; a set of high-level procedures and guidelines that must be extensively customized for your environment and serves as a vital point of reference when determining root cause and how to proceed with recovery with Microsoft Support. SummaryThere are several excellent reasons for virtualizing Windows Active Directory. The release of Windows Server 2012 and its virtualization-safe features and support for rapid domain controller deployment alleviates many of the legitimate concerns that administrators have about virtualizing AD DS. VMware® vSphere® and our recommended best practices also help achieve 100 percent virtualization of AD DS. Please reach out to your Dell EMC representative or checkout Dell EMC Consulting Services to learn how we can help you with virtualizing AD DS or leave me a comment below and I’ll be happy to respond back to you. SourcesVirtualizing a Windows Active Directory Domain Infrastructure Related BlogBest Practices for Virtualizing Active Directory Domain Controllers (AD DC), Part I The post Best Practices for Virtualizing Active Directory Domain Controllers (AD DC), Part II appeared first on InFocus Blog | Dell EMC Services. |
|
Update your feed preferences | |
Tag: Flexible single master operation
7023293: How to repair ADLDS repplication issues within the LDS instance used by DRA
This document (7023293) is provided subject to the disclaimer at the end of this document.
Environment
NetIQ Directory and Resource Administrator 8.x
NetIQ Directory and Resource Administrator 9.x
Situation
Each NetIQ Directory and Resource Manager (DRA) Sever hosts a local ADLDS instance. This allows for secure replication of various DRA configuration settings, as well certain AD object properties; only visible within DRA. Replication between each local instance on DRA servers is controlled via the built-in ADLDS replication settings. Each DRA server will register its hostname and ADLDS service name within the sites and services container of the ADLDS Configuration partition. Successful ADLDS replication is also required in order for the ADLDS instance hosted on the Primary Server to validate its invalid Flexible Single Master Operation (FSMO) roles.
The ADLDS instance on the Primary DRA Server will host the schema master and naming master ADLDS roles. This roles are required in order to modify the ADLDS schema and create new objects within the ADLDS instance. These actions are required in order to maintain the health of the DRA MMS as well as apply DRA product patches and version upgraded.
The status of the ADLDS Replication can be validated within the DRA 9.2 (and newer) built-in and standalone Health Check Utility. In addition the Windows Event Viewer ADAM Event logs will report on the health and status of the local ADLDS instance.
Resolution
The status of the ADLDS Replication can be validated within the DRA 9.2 (and newer) built-in and standalone Health Check Utility. Should the HCU report a failure with the ADLDS replication, it will often provide the administrator with a Fix-It option.
Should the HCU utility not be able to fix the error, or you are running an older version of DRA; it is possible to use the Microsoft Replication Admin (RepAdmin) CMD utility to fix the issue.
Before launching the utility it is helpful to validate the current replication partners contained within configuration partition; located on each DRA servers local LDS instance. This can be done using Microsoft Active Directory Service Interface Editor (ADSIEdit). By default only the AD account running the DRA Services will have Admin rights into the local ADLDS instance. Once in ADSI Edit, you will need to connect to the Configuration naming context on the local server, using port 50000. Once in the configuration the replication partners are stored within the following path: CN=Servers,CN=Default-First-Site-Name,CN=Sites,CN=Configuration,CN={<Unique Guid shared among all ADLDS instances in the current replication set>}. Each replication partner will be represented a Server Object with the naming format: <DRAServerName>$<ADLDS Windows Service Name on the DRA Server>. If any server objects listed are invalid, ADLDS replication will fail.
Once every DRA Server’s ADLDS instance has the correct replication partners, you will need to re-start the replication, using the steps below. These steps must be done from an Administrator CMD Prompt, in the context of the DRA Service Account.
1. Disable outbound replication on all DRA Servers:Repadmin /options <DRAServername>:50000 +DISABLE_OUTBOUND_REPL
2. Disable inbound replication on all DRA ServersRepadmin /options <DRAServerName>:50000 +DISABLE_INBOUND_REPL
3. Re-enable outbound replication ONLY on the Primary DRA ServerRepadmin /options <PrimaryDRAServername>:50000 -DISABLE_OUTBOUND_REPL
4. Re-enable inbound replication on all secondary DRA ServersRepadmin /options <DRAServerName>:50000 -DISABLE_INBOUND_REPL
5. Force the ADLDS instance on the Primary DRA Server to replicate its contents to all secondary DRA ServersRepadmin /syncall <PrimaryDRAServerName>:50000
6. Re-enable Inbound Replication on the Primary DRA ServerRepadmin /options <PrimaryDRAServerName>:50000 -DISABLE_INBOUND_REPL
7. Re-enable outbound replication on all secondary DRA ServersRepadmin /options <DRAServername>:50000 -DISABLE_OUTBOUND_REPL
8. Run another ADLDS ReplicationRepadmin /syncall <PrimaryDRAServerName>:50000
The replication status can be validated using: repadmin /showrepl <DRAservername>:50000. The DRA implementation of ADLDS features three naming contexts to be replicated:
- Configuration
- Schema
- DRA.COM
Cause
The ADLDS replication can fail for a number of reasons. One more common reason is invalid replication partners. Anyone common reason is multiple ADLDS instances running on a single DRA Server. When the ADLDS replication fails, successful validation of the FSMO roles will also fail. The replication must be fixed, before the ADLDS FSMO roles can be validated.
Additional Information
The DRA Standalone Health Check Utility , can be installed from the <path to NetIQAdmininstallationKit>Evaluation Utilities folder. This HCU can be installed on any DRA 9.x server.
Disclaimer
This Support Knowledgebase provides a valuable tool for NetIQ/Novell/SUSE customers and parties interested in our products and solutions to acquire information, ideas and learn from one another. Materials are provided for informational, personal or non-commercial use within your organization and are presented “AS IS” WITHOUT WARRANTY OF ANY KIND.
Related:
Symantec Data Loss Prevention – Secondary Domain Conrollers
-krb3.ini
-Directory Connections
[libdefaults]
default_realm = Domain1
kdc = DomainController1
}
Cameron Mottus
Related:
Event ID 4510 — DNS Server Active Directory Integration
Event ID 4510 — DNS Server Active Directory Integration
Updated: November 13, 2007
Applies To: Windows Server 2008
You can configure the DNS Server service to use Active Directory Domain Services (AD DS) to store zone data. This makes it possible for the DNS server to rely on directory replication, which enhances security, reliability, and ease of administration.
Event Details
Product: | Windows Operating System |
ID: | 4510 |
Source: | Microsoft-Windows-DNS-Server-Service |
Version: | 6.0 |
Symbolic Name: | DNS_EVENT_DP_FSMO_UNAVAILABLE |
Message: | The DNS server was unable to connect to the domain naming FSMO %1. No modifications to Directory Partitions are possible until the FSMO server is available for LDAP connections. The event data contains the error code. |
Resolve
Correct the problem with the domain naming master
Determine and correct the problem that is preventing access to the server that has the domain naming operations master role (also known as flexible single master operations or FSMO):
- Ensure that the domain naming master is running properly.
- Ensure that the local DNS server can reach the the domain naming master.
- Ensure that directory replication is functioning properly.
For information about troubleshooting AD DS, see Active Directory Troubleshooting Topics (http://go.microsoft.com/fwlink/?LinkId=95789).
Verify
Ensure that Event IDs 4523 and 4524 are being logged and that no events in the range 4000 to 4019 appear in the Domain Name System (DNS) event log.
Related Management Information
DNS Server Active Directory Integration
Related:
Event ID 4401 — NPS and Domain Controller Communication
Event ID 4401 — NPS and Domain Controller Communication
Updated: December 16, 2008
Applies To: Windows Server 2008 R2
Network Policy Server (NPS) contacts domain controllers to perform authentication and authorization for connection requests received from configured RADIUS clients. If NPS cannot contact domain controllers, it cannot perform authentication and authorization, and network access authentication will fail.
Event Details
Product: | Windows Operating System |
ID: | 4401 |
Source: | NPS |
Version: | 6.1 |
Symbolic Name: | IAS_DC_NOT_RESPONSIVE |
Message: | Domain controller %1 for domain %2 is not responsive. NPS switches to other DCs. |
Resolve
Fix domain controller issues
To perform this procedure, you must be a member of Domain Admins.
To fix domain controller issues:
- Wait for a domain controller to respond to NPS. One or more domain controllers might be offline due to reboots or other issues, such as hardware failure or temporary network congestion. Domain controllers might respond shortly, and NPS will switch to other domain controllers automatically.
- If the problem is not temporary and NPS frequently has trouble contacting domain controllers to perform authentication and authorization for connection requests, add more backup domain controllers to the network. In addition, configure your network so that there are multiple paths between servers running NPS and domain controllers. If there is a network outage on one path between NPS and a domain controller, additional paths will allow the two entities to communicate.
Verify
To verify that domain controllers are available:
Review the NPS accounting data to verify that connection requests are being processed normally.
To locate the NPS accounting data:
- Click Start, Administrative Tools, Network Policy Server. The NPS Microsoft Management Console (MMC) opens.
- In the console tree, click Accounting.
- In the details pane, click either Configure Local File Logging or Configure SQL Server Logging to identify the folder location or data source for the log file.
- In Windows Explorer, browse to the log file location. Without opening the log file, make a copy of the log file, and then open the log file copy in your text editor. If domain controllers are available and NPS has received and processed connection requests, recent log file entries will appear in the file.
Related Management Information
NPS and Domain Controller Communication
Network Policy Server Infrastructure
Related:
Event ID 4402 — NPS and Domain Controller Communication
Event ID 4402 — NPS and Domain Controller Communication
Updated: December 16, 2008
Applies To: Windows Server 2008 R2
Network Policy Server (NPS) contacts domain controllers to perform authentication and authorization for connection requests received from configured RADIUS clients. If NPS cannot contact domain controllers, it cannot perform authentication and authorization, and network access authentication will fail.
Event Details
Product: | Windows Operating System |
ID: | 4402 |
Source: | NPS |
Version: | 6.1 |
Symbolic Name: | IAS_NO_DC_AVAILABLE |
Message: | There is no domain controller available for domain %1. |
Resolve
Fix domain controller issues
To perform this procedure, you must be a member of Domain Admins.
To fix domain controller issues:
- Wait for a domain controller to respond to NPS. One or more domain controllers might be offline due to reboots or other issues, such as hardware failure or temporary network congestion. Domain controllers might respond shortly, and NPS will switch to other domain controllers automatically.
- If the problem is not temporary and NPS frequently has trouble contacting domain controllers to perform authentication and authorization for connection requests, add more backup domain controllers to the network. In addition, configure your network so that there are multiple paths between servers running NPS and domain controllers. If there is a network outage on one path between NPS and a domain controller, additional paths will allow the two entities to communicate.
Verify
To verify that domain controllers are available:
Review the NPS accounting data to verify that connection requests are being processed normally.
To locate the NPS accounting data:
- Click Start, Administrative Tools, Network Policy Server. The NPS Microsoft Management Console (MMC) opens.
- In the console tree, click Accounting.
- In the details pane, click either Configure Local File Logging or Configure SQL Server Logging to identify the folder location or data source for the log file.
- In Windows Explorer, browse to the log file location. Without opening the log file, make a copy of the log file, and then open the log file copy in your text editor. If domain controllers are available and NPS has received and processed connection requests, recent log file entries will appear in the file.
Related Management Information
NPS and Domain Controller Communication
Network Policy Server Infrastructure
Related:
Event ID 12295 — Domain Controller Demotion
Event ID 12295 — Domain Controller Demotion
Updated: November 25, 2009
Applies To: Windows Server 2008
You can use the Active Directory Domain Services Installation Wizard (Dcpromo.exe) to promote a server to a domain controller and to demote a domain controller to a member server (or to a stand-alone server in a workgroup if the domain controller is the last domain controller in the domain). As part of the demotion process, the wizard removes the configuration data for the domain controller from Active Directory Domain Services (AD DS). This data takes the form of an NTDS Settings object that exists as a child of the server object in Active Directory Sites and Services. The information is in the following location in AD DS:
CN=NTDS Settings,CN=server,CN=Servers,CN=site,CN=Sites,CN=Configuration,DC=domain
The attributes of the NTDS Settings object include data that represents how the domain controller is identified in relation to its replication partners, the naming contexts that are maintained on the machine, whether the domain controller is a global catalog server, and the default query policy. The NTDS Settings object is also a container that may have child objects that represent the domain controller’s direct replication partners. This data is required for the domain controller to operate in the environment, but it is retired at demotion of the domain controller.
Event Details
Product: | Windows Operating System |
ID: | 12295 |
Source: | SAM |
Version: | 6.0 |
Symbolic Name: | SAMMSG_DATABASE_FILE_NOT_DELETED |
Message: | The SAM database attempted to delete the file %1 as it contains account information that is no longer used. The error is in the record data. Please have an administrator delete this file. |
Resolve
Delete the referenced file manually
The Security Accounts Manager (SAM) was not able to delete the file that was referred to in the Event Viewer event text. Go to the file location that is referred to in the Event Viewer event text, and delete the file. If you are not able to delete the file, try again after you restart the computer. Perform the following procedure using a domain member computer that has domain administrative tools installed.
To perform this procedure, you must have membership in Domain Admins, or you must have been delegated the appropriate authority.
To manually delete the referenced file:
- Type the path to the file in the Run box. For example, if the file to be deleted is C:\Windows\NTDS\ntds.dit, click Start, click Run, type c:\Windows\NTDS, and then press ENTER.
If the User Account Control dialog box appears, confirm that the action it displays is what you want, and then click Continue.
- Right-click the file named NTDS, and then click Delete.
Note: As an alternative, you can type del C:\Windows\NTDS\ntds.dit /q at a command prompt.
Verify
To ensure that the domain controller demotion was successful, verify that the Active Directory database files were removed and that the computer account is no longer in the Domain Controllers organizational unit (OU) or in the Domain Controllers group in Active Directory Users and Computers. Perform the following procedures using a domain member computer that has domain administrative tools installed.
To perform these procedures, you must have membership in Domain Admins, or you must have been delegated the appropriate authority.
Verify that the Active Directory database files were removed
To verify that the Active Directory database files were removed:
- Open a command prompt as an administrator. To open a command prompt as administrator, click Start. In Start Search, type Command Prompt. At the top of the Start Menu, right-click Command Prompt, and then click Run as administrator. If the User Account Control dialog box appears, confirm that the action it displays is what you want, and then click Continue.
- At the command prompt, type cd /d %windir%\ntds, and then press ENTER. (If you installed Active Directory to a nondefault folder when you installed this domain controller, substitute that folder name and path for %windir%\ntds). If the result of this command is File not found, the files were deleted successfully.
Verify that the computer account is no longer in the Domain Controllers OU or the Domain Controllers group
To verify that the computer account is no longer in the Domain Controllers OU or the Domain Controllers group:
- Open Active Directory Users and Computers. To open Active Directory Users and Computers, click Start. In Start Search, type dsa.msc, and then press ENTER.
- Expand the domain object, if necessary, and then click the Domain Controllers OU. If the computer account is not in this container, the removal of the computer account from the OU was successful.
- Right-click the domain object, and then click Find.
- In Name, type Domain Controllers, and then click Find Now. The Domain Controllers group appears in Search results.
- Right-click the Domain Controllers group, and then click Properties.
- On the Members tab, ensure that the computer account is not listed.
Related Management Information
Related:
Event ID 1977 — Replication Changes
Event ID 1977 — Replication Changes
Updated: November 25, 2009
Applies To: Windows Server 2008
The replication process in Active Directory Domain Services (AD DS) ensures that domain controllers are able to maintain a consistent and updated Active Directory database. Because the Active Directory database holds essential information about user, group, and computer accounts, as well as other resources and services and the network configuration, keeping this information consistent on all the domain controllers is important. Failure of the Active Directory replication process can result in the following problems:
- Failure of applications that rely on consistent Active Directory information to function properly
- Logon rejections
- Password change failures
- Network service failures
- Incorrect or outdated information retrieval
For more information, see How Active Directory Replication Topology Works (http://go.microsoft.com/fwlink/?LinkID=93526).
Event Details
Product: | Windows Operating System |
ID: | 1977 |
Source: | Microsoft-Windows-ActiveDirectory_DomainService |
Version: | 6.0 |
Symbolic Name: | DIRLOG_DRA_REPLICATION_ALL_ACCESS_DENIED_DC |
Message: | The following directory service made a replication request for a writable directory partition that has been denied by the local directory service. The requesting directory service does not have access to a writable copy of this directory partition. Requesting directory service: %2 Directory partition: %1 User Action If the requesting directory service must have a writable copy of this partition, verify that the security descriptor on this directory partition has the correct configuration for the Replication Get Changes All access right. You may also get this message during the transition period after a child partition has been removed. This message will cease when knowledge of the child partition removal has replicated throughout the forest. . |
Resolve
Ensure that the security descriptors are set correctly on the directory partition
To perform this procedure, you must have membership in Domain Admins, or you must have been delegated the appropriate authority.
To ensure that the security descriptor is set correctly on the directory partition:
- On any domain controller in the domain, open ADSI Edit. To open ADSI Edit, click Start. In Start Search, type ADSIEdit.msc, and then press ENTER. If the User Account Control dialog box appears, confirm that the action it displays is what you want, and then click Continue.
- If the directory partition from the error message does not appear, in the console tree, right-click ADSI Edit, and then click Connect to. In Connection Point, type the Lightweight Directory Access Protocol (LDAP) path of the partition from the error message into Select or type a Distinguished Name or Naming Context (for example, DC=cpandl,DC=com), and then click OK.
- In the console tree, expand the object that represents the naming context of the partition from the error message. You should see another object with the LDAP path (for example, DC=cpandl,DC=com) that was identified in the event message text.
- Right-click the object that has the name of the LDAP path from the event message text, and then click Properties.
- On the Security tab, in the Group or user names box, click Enterprise Read-only Domain Controllers. If the Enterprise Read-only Domain Controllers group, or any other group that is mentioned in the following steps, does not appear in the Group or user names box, click Add. Type the name of the group, and then click OK.
- In Permissions for Enterprise Read-only Domain Controllers, ensure that the Allow check box is selected for the permission Replicating directory changes. If you are configuring permissions on the Schema partition, also ensure that the Allow check box is selected for the permissions Replicating Directory Changes In and Replicating directory changes all.
- In Group or user names, click ENTERPRISE DOMAIN CONTROLLERS.
- In Permissions for ENTERPRISE DOMAIN CONTROLLERS, ensure that the Allow check box is selected for the following permissions: Replicating directory changes, Replicating Directory Changes In, Replicating directory changes all, and Replication synchronization.
If you are configuring a domain partition, proceed with the next step. If you are not configuring a domain partition, you may skip the next two steps.
- In the Group or user names box, click Domain Controllers.
- In Permissions for Domain Controllers, ensure that the Allow check box is selected for the permission Replicating directory changes all.
- Click OK.
- Close ADSI Edit.
Note: In ADSI Edit, the permission “Replicating Directory Changes All” may be missing the final letter in the word “All.” The permission Replicating Directory Changes In, should be Replicating Directory Changes In Filtered Set, as it appears correctly in other interfaces.
Verify
Perform the following tasks using the domain controller from which you want to verify that Active Directory replication is functioning properly.
To perform this procedure, you must have membership in Domain Admins, or you must have been delegated the appropriate authority.
To verify that Active Directory replication is functioning properly:
- Open a command prompt as an administrator. To open a command prompt as an administrator, click Start. In Start Search, type Command Prompt. At the top of the Start menu, right-click Command Prompt, and then click Run as administrator. If the User Account Control dialog box appears, confirm that the action it displays is what you want, and then click Continue.
- Run the command repadmin /showrepl. This command displays the status reports on all replication links for the domain controller. Active Directory replication is functioning properly on this domain controller if all status messages report that the last replication attempt was successful.
If there are any indications of failure or error in the status report following the last replication attempt, Active Directory replication on the domain controller is not functioning properly. If the repadmin command reports that replication was delayed for a normal reason, wait and try repadmin again in a few minutes.
Related Management Information
Related:
Event ID 1411 — SPN Generation
Event ID 1411 — SPN Generation
Updated: November 25, 2009
Applies To: Windows Server 2008
The client and the server verify their respective identities before replication occurs. This verification process is known as mutual authentication. The client verifies (that is, authenticates) the server’s service by composing a Service Principal Name (SPN) using known data or data that is retrieved from sources other than the service itself.
When a domain controller sends change notifications to its replication-partner domain controllers in the domain, the domain controller keeps a list of domain controllers in the repsTo attribute for the directory partition object. The Knowledge Consistency Checker (KCC) typically removes domain controllers from this list if they do not replicate for more than 24 hours. The removal process occurs at set intervals as one of the last steps in KCC processing.
Event Details
Product: | Windows Operating System |
ID: | 1411 |
Source: | Microsoft-Windows-ActiveDirectory_DomainService |
Version: | 6.0 |
Symbolic Name: | DIRLOG_BUILD_SPN_FAILURE |
Message: | Active Directory failed to construct a mutual authentication service principal name (SPN) for the following domain controller. Domain controller:%1 The call was denied. Communication with this domain controller might be affected. Additional Data Error value:%3 %2 |
Resolve
Ensure that replication partners are accessible
Perform the following tasks using the domain controller that reported the issue.
To perform this procedure, you must have membership in Domain Admins, or you must have been delegated the appropriate authority.
To ensure that replication partners are accessible:
- Open a command prompt as an administrator. To open a command prompt as an administrator, click Start. In Start Search, type Command Prompt. At the top of the Start menu, right-click Command Prompt, and then click Run as administrator. If the User Account Control dialog box appears, confirm that the action it displays is what you want, and then click Continue.
- Run the command repadmin /showreps. This command displays the currect replication partners of the domain controller.
- On each domain controller that is identified as a replication partner, run the command dcdiag /fix. This command registers the appropriate service principal names (SPNs) for that domain controller.
- On each domain controller that is identified as a replication partner, run dcdiag /test:OutboundSecureChannels /testdomain:domain,where domain is the actual domain name of the domain controller that is reporting the error message. This command tests all secure channels for the domain controller.
- On the domain controller that is reporting this error, run repadmin /syncall domain, where domain is the actual domain name of the domain controller that is reporting the error message.
If the event message continues to appear in Event Viewer, see article 938704 in the Microsoft Knowledge Base (http://go.microsoft.com/fwlink/?LinkId=104549) for additional troubleshooting steps.
Verify
Perform the following procedure using the domain controller from which you want to verify that Active Directory replication is functioning properly.
To perform this procedure, you must have membership in Domain Admins, or you must have been delegated the appropriate authority.
To verify that the appropriate Service Principal Names (SPNs) are generated:
- Open a command prompt as an administrator. To open a command prompt as an administrator, click Start. In Start Search, type Command Prompt. At the top of the Start menu, right-click Command Prompt, and then click Run as administrator. If the User Account Control dialog box appears, confirm that the action it displays is what you want, and then click Continue.
- Run the command dcdiag /test:outboundsecurechannels /s:computername, /testdomain:domainname. Substitute the actual names of the computer and the domain for computername and domainname, respectively. The command runs a series of tests. If all tests indicate success, the appropriate SPNs are registered.
Related Management Information