Hi everyone.
I tried finding a solution, searching through the web, but didn't find anything helpful
following scenario:We access Domain-Controllers using an ESAE-Domain with Accounts that use a certificates to logon. We connect using mstsc.exe /remoteguard. The User is member of the Domain-Administrators group through Shadow-Principle.Everything is working fine. (login, Domain-Admin Rights working etc.)
The Domain-Controllers got exchanged against 2 New Windows Server 2022 Domain Controllers, hosted in Azure.
FSMO-Roles have been moved.
The Old DCs have been decomissioned.
Connecting to the DCs is working without any issues, BUT, when I want to change the password of an user account, I receive an error-message:The requested operation cannot be completed. The computer must be trusted for delegation and the current user account must be configured to allow delegation.within EventVWR (Security Log) I see dpapi Error with Event-ID: 4694
Looking throught this post: DPAPI MasterKey backup failures - Windows Server | Microsoft Learn I did the following:
Trying to run Cred man I receive Error 0x80090345 pointing in the same direction.
nltest /dsgetdc:<domain> /writable gives me NO error, and a valid result, for both local Domain and ESAE-Domain.
Both Domains only consist of RWDCs, no RODCs.
Netlogon Log showed me following: (DC / Domain-names and IP-Addresses changed)
01/03 09:26:24 [MISC] [8616] DOM: DsGetDcName function called: client PID=772, Dom:ESAE Acct:(null) Flags: DS WRITABLE NETBIOS RET_DNS
01/03 09:26:24 [MISC] [8616] NetpDcInitializeContext: DSGETDC_VALID_FLAGS is c1fffff101/03 09:26:24 [MAILSLOT] [8616] Received ping from xxxxxxxx(xxxxxxx.domain.forest) esae.domain.local (null) on <Local>01/03 09:26:24 [CRITICAL] [8616] Ping from xxxxxxxx for domain esae.domain.local ESAE for (null) on <Local> is invalid since we don't host the named domain.01/03 09:26:24 [MISC] [8616] NetpDcGetName: esae.domain.local using cached information ( NlDcCacheEntry = 0x00000180E21132C0 )01/03 09:26:24 [MISC] [8616] DsGetDcName: results as follows: DCName:\DC1.esae.domain.local DCAddress:\127.127.10.10 DCAddrType:0x1 DomainName:esae.domain.local DnsForestName:esae.domain.local Flags:0xe003f17d DcSiteName:ESAE-Site ClientSiteName:(null)01/03 09:26:24 [MISC] [8616] DOM: DsGetDcName function returns 0 (client PID=772): Dom:ESAE Acct:(null) Flags: DS WRITABLE NETBIOS RET_DNS
The solution from the site, saving the masterkey locally it, of course, not applicable in this case, since we are connecting to a DC.
did we forget something regarding the Shadow-Principals?
Could a Port be missing to be allowed from Azure to the local Datacenter?