Is it possible to import users from an Access Databse into Active Directory in Win Serv 2k3?

Posted on 2004-11-10
Last Modified: 2010-04-19
We have ordered a server for about 20 computers for the press dpt in a school (Probably about 50 users will use these computers). We created a Microsoft Access Database with everyone's name, login name, temporary password, group they will be in, etc. so we can be organized, and also to be able to send out letters to everyone with their login information with mail merge...We were just going to type all of the users again into active directory when we get the server in, but is there any way to import the users from a database? Also, a little off topic, but we have set up an image that we are going to send to the other computers using ghost, and I've heard from somebody that the computer cannot be on the domain when you image it...Is that true? We just set the computer name to xxxxx and we were just going to go in and change it on each computer as it is imaged...Would there be any problem with this? Even if we just imaged 1-at-a-time and changed it there?

Thank you, Adam
Question by:ajschw
    LVL 11

    Expert Comment

    you can use tools like dsadd, dsmod or ldifde to manipulate the ad by script.
    imaging has the problem of duplicate sid's.
    a computer is not identified on his name, his SID (Security ID) is used for this.
    this SID is generated while the computer is installed.
    you must use a sidchanger before you use a imaged pc on your net. you will find them on google.
    LVL 20

    Accepted Solution

    Hi Adam,

    There isn't a direct method for importing info to AD from Access. You could export the information to a .csv file and then use one of the command line tolls to import the file to AD, such as Ldifde

    With Ghost you shouldn't really ghost a machine while it's on the domain as it clones the SID and will cause problems if you have two identical SID on the same network. You can use the ghostwalker utility with ghost (ghstwalk) to change the sid, then add the machines to the domain.


    Write Comment

    Please enter a first name

    Please enter a last name

    We will never share this with anyone.

    Featured Post

    Find Ransomware Secrets With All-Source Analysis

    Ransomware has become a major concern for organizations; its prevalence has grown due to past successes achieved by threat actors. While each ransomware variant is different, we’ve seen some common tactics and trends used among the authors of the malware.

    This may not be a text book method to resolve VSS backup issues but it seemed to have worked on few of the Windows 2003 servers we had issues while performing a Volume Shadow Copy backup. If you have issues while performing a shadow copy backup usin…
    Setting up a Microsoft WSUS update system is free relatively speaking if you have hard disk space and processor capacity.   However, WSUS can be a blessing and a curse. For example, there is nothing worse than approving updates and they just have…
    This video is in connection to the article "The case of a missing mobile phone (". It will help one to understand clearly the steps to track a lost android phone.
    Here's a very brief overview of the methods PRTG Network Monitor ( offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…

    761 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    15 Experts available now in Live!

    Get 1:1 Help Now