Over the past week, some of our users have encountered an error denying access to add SID history. This problem can arise for several reasons. Let’s take a look below.
Approved: Fortect
SID history does not move
I am currently trying to migrate AD 2003 in a lab and have encountered an issue where the SID history is not working because I expect this idea to work.
I have two separate w2k3 forests / domains in native mode. There is a full forest trust with SID history enabled and quarantine disabled
(via Netdom Trust <…> / EnableSIDHistory: yes and / Quarantine: no). I have a user migrated via Quest QMM with SID history. When I check the
principal through ADSIEDIT, I see that the objectSID in the
buying domain matches the entry in the sIDHistory attribute in the target domain for this
user.
To check if the whole story page is working, I’ll try a special simple test. I created a share via a workstation in the original domain, taking into account certain
folders belonging to the migrated owner, the group the user belongs to, so EVERYONE, nobody, etc. In this case, the user logs into the workstation
in the new target domain and tries to access the most important folders.
I expected to be able to access the folder through the SID history that was allowed
a specific user in the original domain. However, it didn’t work for me. I am accessing a forbidden error. If
Add
I moved the user to the folder directly, I can access it.
On a workstation with folders, I see NT AUTHORITY ANONYMOUS
LOGON, event ID: all 540 when I receive access to the folder and I was denied permission.
I am using the verified Kerbtray, Klist and Tokensz resources on the computer I am connecting to
to check if I can display the correct token, but I don’t think these props will be helpful. I will be there.
Daniel,
make sure the folder you usually test grants direct access with permissions to the user on the source domain, not the group. If you are doing
the last mentioned, you must first have a progression group (with its sIDHistory)
first …
I am trying to do an AD 2003 migration in a lab and ran into an issue in the process where the SID history does not mean it works as I assume the child will.
I have two separate forests / domains in my own w2k3 style. Full forest size trust exists with SID history enabled and
quarantine disabled (via Netdom < …> / EnableSIDHistory trust: yes as / Quarantine: no). I have a user migrated via Quest QMM with SID history. Checking the main
with ADSIEDIT, I can see that the
objectSID of the source domain is the same as An entry in the dedicated sIDHistory in the target domain for this user.
Approved: Fortect
Fortect is the world's most popular and effective PC repair tool. It is trusted by millions of people to keep their systems running fast, smooth, and error-free. With its simple user interface and powerful scanning engine, Fortect quickly finds and fixes a broad range of Windows problems - from system instability and security issues to memory management and performance bottlenecks.
To check if the sid history is working, I am working on a simple test. I created a Speak on a workstation via a website in source code with some
folders that allow the converted user, the group that user belongs to EVERYONE, n ‘no matter who, etc. Then I log in as a user on the workstation
which is in the target domain and try to access the shared folders
.
I expected that ideally I would be able to access the folder which is
if you want a user on the original domain from the SID history. However, it didn’t work for me. I am accessing a forbidden error. If
Add
I moved the user directly to the file, I can access it.
On a specific workstation with folders, I see NT AUTHORITY ANONYMOUS
LOGON, Event ID: all 540 when I try to access the folder and permission is denied.
Network connection successful:
Username:
Domain:
Connection ID: (0x0,0x196CBC)
Connection type nia: 3
Connection process: NtLmSsp
Authentication package: NTLM
Workstation name: DANIEL-PC
Registration GUID: 00000000-0000-0000-0000-000000000000
I have tried kerbtray, klist in addition to the Tokensz utilities on the computer I login from to see if I have the correct token, but I don’t think these tools will help me here.
Thanks for your reply.
I was denied use when trying to access
to a directory authorized to directly access the website domain.
Message from Marcin
Daniel,
Make sure the permissions of the test folder allow access to the user account on the form’s domain and not through a group. If you do the latter, you should definitely go to the migration group (with your dog’s sIDHistory)
first … hth
Marcin
Hello,
I’m going to try AD Migration 2004 in the lab work and SID history not working, problems working as expected
.
I have two separate w2k3 forests / domains of my own. There is a full forest trust with SID history enabled and
quarantine disabled (via netdom based on <†¦> / EnableSIDHistory: yes and / Quarantine: no). My user went to Quest QMM with SID history. By checking
via ADSIEDIT, can I detect that the objectSID in the source domain
matches the access in the sIDHistory attribute in the target domain, because this user is
.
To check if Sid’s story is working I am trying this simple test. I created a share on a workstation with all the original domain with multiple folders,
authorized to help you for migrated user, for user family
, ALL, for everyone, etc. Then I personally connect to the workstation
in the target domain and / or trying to access shared folders
.
I expect to be able to start browsing the user’s folder allowed in the exact source domain through the SID history. However, it didn’t work for me. I am getting a “Use is prohibited” error. If
Add
I moved the subscriber directly to the folder, I can access it.
On a workstation with files I see NT AUTHORITY ANONYMOUS
LOGON, event ID: 540, every time I try to access the best folder and I am denied oncesolution
.
Login ID: (0x0,0x196CBC)
Login Type: 3
Login Process: NtLmSsp
Authentication Package: NTLM
Workstation Username: DANIEL-PC
Login GUID: 00000000-0000- 0000-0000-000000000000
I tried kerbtray, klist in addition to tokensz utilities on my pc.
Login to see if I’m showing the correct token, but I don’t think any of these tools will help me.
Any ideas and troubleshooting steps are greatly appreciated.
Regards, Daniel S.
Message from Daniel S.
Thank you for your reply.
I am accessing while denied access to the folder with
permission directly to our user from the original domain.
/ quote from the link above:
—
I just fixed this issue on a client website. “Undocumented”
Requirement when using ADMT in a Windows 2003 forest.
/ EnableSIDHistory Valid for outbound forest trusts only. Specifying yes
allows users who have migrated from another forest to the trusted forest
background SID to access resources in that forest. This should only be donein the event that the trusted Hardwoods administrators can be trusted enough to specify the SID for this forest in the past SIDs based on the attributes of their users.
Specifying “No” will unambiguously disable users who are transferred to the trusted forest,
using the SID score to access resources in that forest.
If you do not specify
/ EnableSIDHistory or yes, no, the latest status will be displayed.
– –
/ endquote
–
Ass
This is an “AS IS” publication without any other warranties, and
grants no rights.
Answer the call in the discussion group or forum for collaboration among engineers who are responsive and help others benefit from your solution.
Ace Fecai, MCT, MCTS Exchange,
Speed up your computer's performance now with this simple download.