Apple Mac joined domain and inherited Domain Controller name!

Posted on 2009-12-18
Last Modified: 2013-12-05
Hi guys

We have resolved this problem, however I wanted to ask you experts how it could have happened.

Basically, a few days ago we connected the Mac Airbook onto the network. I then joined it to the domain. That's when everything on our Windows network went down. We later realised that the Mac's machine name was identical to our Domain Controller's name. Even when we took the Mac off the network and then restarted all of our servers, it had corrupted the Kerberos so Active Directory, DNS nothing was working. It was because somehow the password in the database and the one in AD had become different!

Can this happen? Plus, when you join a Mac to the domain surely if it had even the same name there would be an error message implying you can't join it due to the names being identical. Or is this a major flaw with Windows?

Thanks for any advice guys
Question by:Yashy
    LVL 27

    Accepted Solution

    It sounds like a Kerberos/LDAP setting which placed the KDC service of the Mac atop of Active Directory.  Without looking at the logs on the DC and the Console on the Mac, I cannot offer anything more than that.

    Why join the Mac to the directory in the first place?  Especially a laptop, what happens when the laptops leave the network?  Aside of being able to use an Active Directory account and a mapped share, what is the advantage?
    LVL 1

    Author Comment

    The only reason it was connected to the domain was to access network drives. Usually, the MACs pick up the network and without an issue they connect to the shared drivers etc. This time, it didn't until it got joined to the domain at which point everything went haywire.

    Either way though, you're right we haven't trailed through the logs on the MAC but we have for the DC. But either way, your answer does shed some more light and puts me in the direction of looking at the MAC logs.

    Thanks man.

    Write Comment

    Please enter a first name

    Please enter a last name

    We will never share this with anyone.

    Featured Post

    Top 6 Sources for Identifying Threat Actor TTPs

    Understanding your enemy is essential. These six sources will help you identify the most popular threat actor tactics, techniques, and procedures (TTPs).

    The /etc/authorization file in Mac OS X 10.x can be used to control access to the various panes of the System Preferences amongst other things. It’s used by some of us Mac Sys Admin’s to give Standard Users access to System Prefs panes that only adm…
    This is a short article about OS X KeRanger, and what people can do to get rid of it.
    Hi everyone! This is Experts Exchange customer support.  This quick video will show you how to change your primary email address.  If you have any questions, then please Write a Comment below!
    Polish reports in Access so they look terrific. Take yourself to another level. Equations, Back Color, Alternate Back Color. Write easy VBA Code. Tighten space to use less pages. Launch report from a menu, considering criteria only when it is filled…

    761 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    7 Experts available now in Live!

    Get 1:1 Help Now