Note
Access to this page requires authorization. You can try signing in or changing directories.
Access to this page requires authorization. You can try changing directories.
This article provides guidance on addressing common secure channel issues encountered on client machines or member servers within a domain during login attempts.
Symptoms
When secure channel issues cause a broken trust relationship between a domain-joined device and its domain, you observe the following symptoms on the computer:
You can't sign in to the computer by using Active Directory or domain credentials. The following error message occurs:
The trust relationship between this workstation and the primary domain failed.
You can sign in using a local user or cached credentials.
You see an Event 3210 from NETLOGON source on the System Event Viewer log:
Log name: System Source: NETLOGON Level: Error Description: This computer could not authenticate with \\DCName.contoso.com, a Windows domain controller for domain CONTOSO, and therefore this computer might deny logon requests. This inability to authenticate might be caused by another computer on the same network using the same name or the password for this computer account is not recognized. If this message appears again, contact your system administrator.If Netlogon logging is enabled, you see something similar to this example:
Date Time [CRITICAL] CORP: NlSessionSetup: Session setup: cannot I_NetServerAuthenticate 0xc0000022 Date Time [CRITICAL] CORP: NlSessionSetup: new password is bad, try old one Date Time [CRITICAL] NlPrintRpcDebug: Couldn't get EEInfo for I_NetServerAuthenticate3: 1761 (may be legitimate for 0xc0000022) Date Time [SESSION] CORP: NlSessionSetup: Negotiated flags with server are 0x612fffff Date Time [CRITICAL] CORP: NlSessionSetup: Session setup: cannot I_NetServerAuthenticate 0xc0000022 Date Time [MISC] Eventlog: 3210 (1) "CORP" "\\DCName.Contoso.com" 2f8270f1 5bc8d5e7 34c3e164 6665df64 .p./...[d..4d.ef Date Time [SESSION] CORP: NlSetStatusClientSession: Set connection status to c0000022 Date Time [SESSION] CORP: NlSetStatusClientSession: Unbind from server \\DCName.Contoso.com (TCP) 0. Date Time [SESSION] CORP: NlSessionSetup: Session setup FailedIf you try to test the secure channel status, you receive an "Access denied" error:
C:\>nltest /sc_query:contoso.com Flags: 0 Trusted DC Name Trusted DC Connection Status Status = 5 0x5 ERROR_ACCESS_DENIED The command completed successfully
Common scenarios
Here are the most common scenarios and their causes:
- The client machine or member server has an older password than the Active Directory database.
- The Active Directory database has an older password than the client machine or member server. (Domain controller is restored to a previous state, or Active Directory replication issues.)
Resolution
To troubleshoot the issue, follow these steps:
Based on the scenario that you encounter, see the corresponding article for solutions:
Other considerations
Make sure the following registry keys contain the actual name of the computer (not the fully qualified domain name (FQDN)):
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\ComputerName\ComputerName\ComputerNameHKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\Tcpip\Parameters\hostname
You can query those keys by running the following commands:
Reg query HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\ComputerName\ComputerName /v ComputerName
Reg query HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\Tcpip\Parameters /v hostname
Note
Some IT technicians or administrators will rejoin the machine to the domain to solve the broken secure channel issue, which is a valid solution. However, if you need to find the cause of constant or repetitive issues, this article will help you find out the root cause in the environment.
More information
Terminology
- Local Security Authority (LSA) secret: a special protected storage used by the Local Security Authority in Windows to store important data. In this series of articles, LSA secret refers to the computer password for a domain-joined device.
- Cupdtime: refers to the last update time for LSA secret, in this series of articles, the computer password. This information is stored in the Windows registry under
HKEY_LOCAL_MACHINE/Security/Policy/Secrets$MACHINE.ACC/cupdtime. - pwdLastSet (PasswordLastSet): a computer object attribute stored in Active Directory.