Solved

How come Windows server cannot change Log On Account of service in Active Directory Domain?

Posted on 2012-03-29
13
426 Views
Last Modified: 2012-04-04
I have a Hybrid Domain with two AD servers managing all windows workstations and servers and a Linux Domain managing linux servers.

The AD servers are Windows Server 2008.  The servers are a mix of 2003 and 2008.

I am trying to change a service to start as a specified domain account instead of Local System Account.  When I make the change I get an error saying "The specified Domain Either does not exist or could not be contated"

The domain is up and available.  I can login ot the system with Domain accounts, I can map and access Domain File Servers, I can browse Domain members .. but I cannot change service account.

The DNS I am using is not the AD it is bind9 .. is this part of the problem?  I can't really see why.  The servers can see each other.

I have disabled the firewall and AV and still no luck.  This behavior can be seen on multiple  member servers.

I ran these commands

dcdiag /v /c /d /e /s:dcname >c:\dcdiag.txt
 repadmin /showrepl dc* /verbose /all /intersite >c:\repl.txt

and saw no errors (other than smart card certificates which we are not using)


Any help would be greatly appreciated.



Thanks
0
Comment
Question by:DanRaposo
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 8
  • 5
13 Comments
 
LVL 6

Expert Comment

by:netjgrnaut
ID: 37783522
Is the BIND9 server acting as a secondary to one of the DNS-enabled DCs?  There should be a _msdtc subzone where the service location records exist.  These are required for AD operations.
0
 
LVL 6

Expert Comment

by:netjgrnaut
ID: 37783523
0
 

Author Comment

by:DanRaposo
ID: 37783636
These are the AD records I have  ( I see no mention of msdtc in the link you referenced.

;   SRV RECORDS FOR ACTIVE DIRECTORY DOMAIN CONTROLLER
_ldap._tcp.mydomain.com. SRV 0 0 389 dc
_kerberos._tcp.mydomain.com. SRV 0 0 88 dc
_ldap._tcp.dc._msdcs.mydomain.com. SRV 0 0 389 dc
_kerberos._tcp.dc._msdcs.mydomain.com. SRV 0 0 88 dc
0
Online Training Solution

Drastically shorten your training time with WalkMe's advanced online training solution that Guides your trainees to action. Forget about retraining and skyrocket knowledge retention rates.

 
LVL 6

Expert Comment

by:netjgrnaut
ID: 37783752
Sorry - I mean "_msdcs" subzone...


_msdcs DNS subdomain
 

The Microsoft-specific subdomain enables location of domain controllers that have specific roles in the Active Directory domain or forest. Resource records for the DNS root domain of a new Active Directory forest are stored in a _msdcs zone instead of a subdomain, and that zone is stored in the forest-wide application directory partition.
 

You are running DNS on the DCs, right (that's the default setup for an AD DC)?  Even though that's not where you're pointing your clients?

Am I correct in assuming that the service you're editing is on one of the Windows AD member servers (not one of the DCs)?

You could test this idea that DNS is the problem (I suspect it is) by configuring one of the member servers to use the DC for DNS, restarting, and trying to reconfigure the service account as previously attempted.  

If it works, then you've got incomplete DNS records in your BIND9 zone - insufficient to fully support your AD member servers.

If it still doesn't work, then you can at least rule out the BIND9 zone as the source of the problem.
0
 
LVL 6

Expert Comment

by:netjgrnaut
ID: 37783755
...also, if you look at the document I linked to, you will see many more SRV records than what you have indicated.
0
 

Author Comment

by:DanRaposo
ID: 37787379
Sorry but that doc link is a bit confusing to me.   It doesn't have all the information on it that I need.   For example which ports?

Yes You are correct in assuming that I am running DNS on the DCs but pointing clients to another (BIND 9 server)

Correct  The service I am  editing is on one of the Windows AD member servers

If I change to AD for DNS the problem does indeed go away .


Could you assist in the syntax of the lines I may need to add?   Would this be correct? I have no sub domains or sites so would this be sufficient?


_ldap._tcp.mydomain.com. SRV 0 0 389 dc
_kerberos._tcp.mydomain.com. SRV 0 0 88 dc
_ldap._tcp.dc._msdcs.mydomain.com. SRV 0 0 389 dc
_kerberos._tcp.dc._msdcs.mydomain.com. SRV 0 0 88 dc

NEW LINES
_ldap._tcp.pdc.mydomain.com. SRV 0 0 389 dc
_ldap._tcp.gc._msdcs.mydomain.com. SRV 0 0 389 dc
_ldap._tcp.pdc._msdcs.mydomain.com. SRV 0 0 389 dc
_gc._tcp.mydomain.com. SRV 0 0 3268 dc
0
 
LVL 6

Expert Comment

by:netjgrnaut
ID: 37787553
Why not just delegate the sub zones back to one of the DCs? This approach will bring you all the records and keep them in sync going forward. You'll get more functionality out of AD that way.
0
 

Author Comment

by:DanRaposo
ID: 37787670
Your losing me... What subzone do I have in my main DNS Zone?
0
 
LVL 6

Expert Comment

by:netjgrnaut
ID: 37787889
Sorry... let me back up a step.

You have a single zone of "mydomain.com" which is being hosted both on AD-enabled DNS DCs *and* on BIND9 Unix hosts.  Correct?

For some reason, you've chosen to do the domain administration on BIND9, and point all of your clients there for resolution.  Correct?

There are host records that exist in the BIND9 version of the mydomain.com zone that *do not* exist in the AD DNS version.  Correct?

Personally, I think the best answer would be to add all of your BIND9-only records to the AD DNS, then reconfigure your BIND9 servers as secondaries to the AD DNS.  This would assure that all only one mydomain.com zone exists across your environment.  But then you'd have to do your DNS admin going forward on the Windows AD servers.  I'm guessing that you don't want to do this (or you wouldn't be trying to run your Windows AD clients against a manually-configured BIND9 DNS server in the first place), right?

The second best answer would be to delegate the AD-specific subzones back to the AD DNS servers.  So... if you look at your AD DNS servers, you will see that the AD-specific SRV records are actually held in sub zones under mydomain.com.

Rather than add individual SRV records to the BIND9 zone, you could delegate the four "_" zones back to the AD DNS servers.  Generally, you shouldn't need to administer these zones by hand (provided you have secure dynamic updating configured).

A quick overview on how to set up subzone delegation on BIND can be found here...
http://www.zytrax.com/books/dns/ch9/delegate.html

If I've made any incorrect assumptions above, please let me know...
0
 

Author Comment

by:DanRaposo
ID: 37788055
You are correct in your assumptions.  The major factor in not using AD DNS is simply that I support both internal and external zone transfer and do not know enough about AD DNS to set this up efficiently

Basically the internal zone resolves to internal IPs and the external zone resolves to public IPs.
0
 
LVL 6

Accepted Solution

by:
netjgrnaut earned 500 total points
ID: 37788114
Sounds like split DNS. Makes sense. But then why point your internal clients to your external (public IP resolving) DNS servers at all?

So I'm still confused. If I were in your situation (as I think I understand it), I would use the BIND servers to resolve outside requests for public IP addresses from a subset of hosts offering services available to the Internet only. Then I would point all internal systems (including the public name servers and all Unix hosts) to internal/private IP resolving AD DNS servers.

It's generally not best practice to expose your private IP space to public queries. Nor is it advisable to make AD accessible from public/untrusted networks.

Am I still missing something?

The BIND name server you're currently working with - the one where you've added the handful of AD records - is it resolving public or private IPs for mydomain.com?
0
 

Author Closing Comment

by:DanRaposo
ID: 37806229
Thanks for helping me work through this issue.  I am going to try to finish conversion to AD based DNS server for all internal zones.  I will keep BIND running for external requests.
0
 
LVL 6

Expert Comment

by:netjgrnaut
ID: 37806332
Good choice, IMHO - you'll be happier in the long run.  :)
0

Featured Post

The Ultimate Checklist to Optimize Your Website

Websites are getting bigger and complicated by the day. Video, images, custom fonts are all great for showcasing your product/service. But the price to pay in terms of reduced page load times and ultimately, decreased sales, can lead to some difficult decisions about what to cut.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Did you know that more than 4 billion data records have been recorded as lost or stolen since 2013? It was a staggering number brought to our attention during last week’s ManageEngine webinar, where attendees received a comprehensive look at the ma…
This article provides a convenient collection of links to Microsoft provided Security Patches for operating systems that have reached their End of Life support cycle. Included operating systems covered by this article are Windows XP,  Windows Server…
This tutorial will walk an individual through the process of transferring the five major, necessary Active Directory Roles, commonly referred to as the FSMO roles from a Windows Server 2008 domain controller to a Windows Server 2012 domain controlle…
This video shows how to use Hyena, from SystemTools Software, to bulk import 100 user accounts from an external text file. View in 1080p for best video quality.

729 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question