Hello, administering Windows Server 2022, that is a member of Active Directory, I am facing similar problem. Symptoms are Audit Failure event logs in Security with Return Code 0x8000900024, e.g.
Log Name: Security
Source: Microsoft-Windows-Security-Auditing
Date: 09.05.2024 10:27:58
Event ID: 5061
Task Category: System Integrity
Level: Information
Keywords: Audit Failure
User: N/A
Computer: comuter.domain.com
Description: Cryptographic operation.
Subject:
Security ID: DOMAIN\firstname.surname
Account Name: firstname.surname
Account Domain: DOMAIN
Logon ID: 0x1C9E36C2
Cryptographic Parameters:
Provider Name: Microsoft Software Key Storage Provider
Algorithm Name: UNKNOWN
Key Name: Microsoft Connected Devices Platform device certificate
Key Type: User key.
Cryptographic Operation:
Operation: Open Key.
Return Code: 0x80090024
The temporary profile issue causes the user folder are created as C:\Users\TEMP, C:\Users\TEMP.<domain>, etc. for affected users, being deleted as soon as user signs out (as expected).
In registry key Computer\HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\ProfileList\S-<profile_ID>
I can see DWORD value
CentralProfile = \\server\Profiles$\firstname.surname\Profile.V6
for affected users when they are currently signed in.
Only 3 users of 130 are affected, their user profiles in Active Directory are equipped with roaming user profile as shown above. It's setting derived from local ADC in the locality where the users work. For a test user without roaming profile, even in the same locality, there was no problem with the temporary profile. So the roaming profile causes the issue with the temporary profile.
I don't currently know a solution for this issue, but my post may help other administrators determine the cause of the problem.
If you have any ideas what to do to make my terminal server Win Server 2022 to accept user roaming profiles, please tell me.
Regards
Leoš