X
GO
en-USfr-FR
Blog
26Mar

Active Directory error message "2148074274 The target principal name is incorrect"

Blog Writer | Debug | Active Directory | | View Counts (806) |Return|
0 ( 0 reviews)
|

      Hi,

 

as it regularly happens when you stop a test platform for a long time, computer accounts password expire and Active Directory controllers do not replicate anymore (well known item since Windows 2000 Active Directory).

 

When you try to manually replicate using dssite.msc, you get the error message "2148074274 The target principal name is incorrect".

 

Moreover, you can see in event viewer some messages such as:

Log Name: System
Source: Security-Kerberos
Event ID: 4
Error: The Kerberos client received a KRB_AP_ERR_MODIFIED error from the server DC2. The target name used was cifs/DC2.dom2016.local. This indicates that the target server failed to decrypt the ticket provided by the client. This can occur when the target server principal name (SPN) is registered on an account other than the account the target service is using. Ensure that the target SPN is only registered on the account used by the server. This error can also happen if the target service account password is different than what is configured on the Kerberos Key Distribution Center for that target service. Ensure that the service on the server and the KDC are both configured to use the same password. If the server name is not fully qualified, and the target domain (DOM2016.LOCAL) is different from the client domain (DOM2016.LOCAL), check if there are identically named server accounts in these two domains, or use the fully-qualified name to identify the server.

 

Solution

- Locate PDC emulator with Active Directory Users and Computers snap-in
- On the DC(s) no more replicating:

  • Disable service "Kerberos Key Distribution Center" (KDC)
  • Reboot DC
  • Reset password within an administrator command prompt
    netdom resetpwd /server:PDC_EMULATOR /userd:DOM2016\administrator /passwordd:password
  • Reboot DC
  • Restart KDC service
  • Force replication

     

Related

ADDS Forest and Domain Functional Levels

Regularly customers ask "why should I raise ADDS functional level"? Here are the anwsers

Hard to replicate Exchange Connectors

When you have multiple Microsoft Exchange Servers receiving emails, you have to create exactly the s...

DSC myAdExchPrepareSchema.psm1

During some automatized deployments, as often, we have to deploy Microsoft Exchange 2016 automatical...

Authenticating users with smartcard and login/password

When a user opens an Active Directory session with his smartcard, it happens that some applications ...

MFA for Azure admins will be soon enforced

Do you know that Microsoft will enforce all privileged Azure AD accounts to use Multi Factor Authent...

Categories
Tags
Popular
  • Recent
  • Popular
  • Tag