Error "Target Principal Name is incorrect" when manually replicating data between domain controllers

This article provides a solution to an error that occurs when you manually replicate data between domain controllers.

Applies to:   Supported versions of Windows Server
Original KB number:   288167

Symptoms

When you use Repadmin.exe or the Active Directory Sites and Services snap-in to manually replicate data between domain controllers, you may receive one of the following error messages:

  • The Target Principal Name is incorrect

  • Access is denied

In addition, the following event ID messages may be logged in the system log:

Event Source: Netlogon  
Event Category: None  
Event ID: 3210  
User: N/A  
Event Description:  
Failed to authenticate with \\DOMAINDC, a Windows NT domain controller for domain DOMAIN.
Event Source: Netlogon  
Event ID: 5722  
Event Category: None  
User: N/A  
Event Description:  
The session setup from the computer 1 failed to authenticate. The name of the account referenced in the security database is 2. The following error occurred: n3

Resolution

To resolve this issue, first determine which domain controller is the current primary domain controller (PDC) Emulator operations master role holder. To do this, run the following command from an elevated command prompt:

netdom query fsmo

On domain controllers that are experiencing this issue, stop the Kerberos Key Distribution Center (KDC) service by using one of the following methods:

  • Run net stop KDC from an elevated command prompt.
  • Run Services.msc. In the Services snap-in, right-click the Kerberos Key Distribution Center service and select Stop.

Purge the system account Kerberos tickets by running klist -li 0x3e7 purge from an elevated command prompt.

Use the Netdom utility to reset the secure channels between these domain controllers and the PDC Emulator operations master role holder. To do so, run the following command from the affected domain controllers:

netdom resetpwd /server:server_name /userd:domain_name\administrator /passwordd:administrator_password

Where server_name is the name of the server that is the PDC Emulator operations master role holder.

After you reset the secure channel, start the KDC service from the Services snap-in or using the net start KDC command.

Attempt replication again.

More information

If there are multiple domain controllers in the domain, the error message that you receive when this issue occurs varies, depending on how replication is attempted and if one of the domain controllers that is involved is also the PDC Emulator operations master role holder.

In some cases, when you use the net view \\computername command to attempt to connect to the domain controller that has the PDC Emulator operations master role from another domain controller, you may receive an "Access denied" error message. However, if you use the IP address, the command may succeed.

When this problem occurs, numerous errors may be reported in the event logs. These errors vary depending on any of the following conditions:

  • The domain controller wasn't fully functional before the problem occurred.

  • The domain controller didn't complete the Active Directory Installation Wizard process.

  • The Sysvol folder on the domain controller wasn't shared.

  • The domain controller didn't have the full file structure under the Domain_name folder and the Policies folder that is located in %SystemRoot%\Sysvol\Sysvol\Domain_name\Policies. The following event is an example of an event that may be reported:

    Event ID: 3034  
    Type: Warning  
    Source: MRxSmb  
    Description: The redirector was unable to initialize security context or query context attributes.
    

Data collection

If you need assistance from Microsoft support, we recommend you collect the information by following the steps mentioned in Gather information by using TSS for Active Directory replication issues.