Solved

ADMT v3 password migration Unable to establish a session with the password server. Either ther currently logged on user...

Posted on 2007-11-28
2
6,978 Views
Last Modified: 2011-08-18
Trying to configure SID migration from the source AD 2000 DC (Child Domain) to the target AD 2003 DC (Root Domain)

Thus far...
- I have setup the trusts and I'm able to verify the trusts bothways
-I can ping the DC's eachway with the NETBios name and FQDN
-I installed PES on the Source 2000 DC
-I was able to create the PES key using "admt key /option:create /sourcedomain: SourceDomain
/keyfile:KeyFilePath"
-

During the User account Migration Wizard I get this error..

Unable to establish a session with the password export server. Either the currently logged on user does not have sufficient permissions to call the Password Export Server or the account that the Password Export Server Service is runing under (PES is using the admin account from the Target domain) does not have sufficent permissions on the target domain controller. Verify that the logged on user is a member of the Administrator group in the source domain and that the Password Export Service account can change password of user accounts in the target domain.


So, how does one make an admin account in the Target Domain a member of the Domain Admins group of the source domain or vise versa? I don't see an option of adding accounts from these two trusted domains. Is it possibly due to the source domain being a child of a root forest? Does the trusts have to be between the two root domains?
0
Comment
Question by:andersenks
2 Comments
 
LVL 15

Accepted Solution

by:
JimboEfx earned 500 total points
ID: 20372262
The group scope means you can only add accounts from say the current domain - e.g. domain local groups.

In order to make an account an admin, make it a member of builtin\administrators on the target DC which will effectively make it domain admin.

I'm typing this from memory, its been a little while since my last admt but that i think is what you need to know...
0
 

Author Comment

by:andersenks
ID: 20376548
ahhh.. that was it... I was looking everywhere to give the domains right to each other

Need to add the admin account to the "Builtin" Administrators  Security Group.

Thanks Jimbo.
0

Featured Post

PRTG Network Monitor: Intuitive Network Monitoring

Network Monitoring is essential to ensure that computer systems and network devices are running. Use PRTG to monitor LANs, servers, websites, applications and devices, bandwidth, virtual environments, remote systems, IoT, and many more. PRTG is easy to set up & use.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Is your Office 365 signature not working the way you want it to? Are signature updates taking up too much of your time? Let's run through the most common problems that an IT administrator can encounter when dealing with Office 365 email signatures.
This article shows the method of using the Resultant Set of Policy Tool to locate Group Policy that applies a particular setting.
This tutorial will walk an individual through the process of transferring the five major, necessary Active Directory Roles, commonly referred to as the FSMO roles to another domain controller. Log onto the new domain controller with a user account t…
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …

830 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question