Want to protect your cyber security and still get fast solutions? Ask a secure question today.Go Premium

x
?
Solved

Event ID 19011 Source MSSQLServer

Posted on 2008-10-29
2
Medium Priority
?
3,989 Views
Last Modified: 2012-06-21
Good morning all,

I am getting the following problem on boot up of my SQL servers

Event ID 19011
Source MSSQLServer
Description
SuperSocket info (SpnRegister): Error 8344

The problem seems to be that my service account does not have enought permissions.  I have spoken to my DBA and gone through the SQL Server 2000 Security (Service Accounts) documentation he has and the following MS artical Q283811.

The DB service account is a Domain User with the following rights in the Application Server GPO

Act as Part of the Operating System
Bypass Traverse Checking
Lock Pages In Memory
Log on as a Batch Job
Log on as a Service
Replace a Process Level Token

Full control over the following registry entries

HKEY_LOCAL_MACHINE\Software\Clients\Mail
HKEY_LOCAL_MACHINE\Software\Microsoft\Microsoft SQL Server\80
HKEY_LOCAL_MACHINE\Software\Microsoft\MSSQLServer\MSSQLServer
HKEY_LOCAL_MACHINE\Software\Microsoft\MSSQLServer\Providers
HKEY_LOCAL_MACHINE\Software\Microsoft\MSSQLServer\Replication
HKEY_LOCAL_MACHINE\Software\Microsoft\MSSQLServer\Setup
HKEY_LOCAL_MACHINE\Software\Microsoft\MSSQLServer\SQLServerAgent
HKEY_LOCAL_MACHINE\Software\Microsoft\MSSQLServer\Tracking

The user has full control over the Log and data areas on the server and is a memeber of the sysadmin group in enterprise admistrator.

Please can anyone suggest what I might be missing to give this user enough rights to prevent this error.
0
Comment
Question by:GarryBaker
  • 2
2 Comments
 

Author Comment

by:GarryBaker
ID: 22830908
OK problem seem to be that the user is unable to register the SPN,  I found a fix saying that you need to confirgure the advanced active directory permission setting to allow the user to Write Public Information.  Does anyone know how to do this and I can seem to be able to find it.

See following ling.

http://www.sqlnewsgroups.net/group/microsoft.public.sqlserver.server/topic12560.aspx
0
 

Accepted Solution

by:
GarryBaker earned 0 total points
ID: 22831199
OK problem resolved.  found the following fix from MS kb811889

To configure the SQL Server service to create SPNs dynamically, follow these steps:1. Click Start, click Run, type Adsiedit.msc, and then click OK.  
2. In the ADSI Edit snap-in, expand Domain [DomainName], expand DC= RootDomainName, expand CN=Users, right-click CN= AccountName, and then click Properties.

Notes
" DomainName is a placeholder for the name of the domain.  
" RootDomainName is a placeholder for the name of the root domain.  
" AccountName is a placeholder for the account that you specify to start the SQL Server service.  
" If you specify the Local System account to start the SQL Server service, AccountName is a placeholder for the account that you use to log on to Microsoft Windows.  
" If you specify a domain user account to start the SQL Server service, AccountName is a placeholder for the domain user account.  
 
3. In the CN= AccountName Properties dialog box, click the Security tab.  
4. On the Security tab, click Advanced.  
5. In the Advanced Security Settings dialog box, make sure that SELF is listed under Permission entries.

If SELF is not listed, click Add, and then add SELF.  
6. Under Permission entries, click SELF, and then click Edit.  
7. In the Permission Entry dialog box, click the Properties tab.  
8. On the Properties tab, click This object only in the Apply onto list, and then make sure that the check boxes for the following permissions are selected under Permissions
" Read servicePrincipalName
" Write servicePrincipalName
 9. Click OK three times, and then exit the ADSI Edit snap-in.  
0

Featured Post

Free Tool: SSL Checker

Scans your site and returns information about your SSL implementation and certificate. Helpful for debugging and validating your SSL configuration.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Wouldn't it be nice if objects in Active Directory automatically moved into the correct Organizational Units? This is what AutoAD aims to do and as a plus, it automatically creates Sites, Subnets, and Organizational Units.
High user turnover can cause old/redundant user data to consume valuable space. UserResourceCleanup was developed to address this by automatically deleting user folders when the user account is deleted.
Viewers will learn how the fundamental information of how to create a table.
Attackers love to prey on accounts that have privileges. Reducing privileged accounts and protecting privileged accounts therefore is paramount. Users, groups, and service accounts need to be protected to help protect the entire Active Directory …

571 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question