{"id":2406,"date":"2014-08-11T11:14:17","date_gmt":"2014-08-11T10:14:17","guid":{"rendered":"http:\/\/www.edwardsd.co.uk\/work\/?p=2406"},"modified":"2014-08-11T11:16:36","modified_gmt":"2014-08-11T10:16:36","slug":"rsat-across-domains-security-database-on-the-server-does-not-have-a-computer-account-for-this-workstation-trust-relationship","status":"publish","type":"post","link":"https:\/\/www.edwardsd.co.uk\/work\/2014\/08\/rsat-across-domains-security-database-on-the-server-does-not-have-a-computer-account-for-this-workstation-trust-relationship\/","title":{"rendered":"RSAT Across Domains | Security database on the server does not have a computer account for this workstation trust relationship"},"content":{"rendered":"<p>Problem when trying to use RSAT to remotely administer a different domain.<\/p>\n<p><strong><em>&#8220;Security database on the server does not have a computer account for this workstation trust relationship&#8221;<\/em><\/strong><\/p>\nngg_shortcode_0_placeholder\n<p>There are numerous blog\/forum posts regarding the cause of this\u00a0error, however most are related to workstations on the local domain not being able to authenticate to the local DC. (The quick fix being to remove the network cable, login with the cached credentials and remove\/readd the PC to the\u00a0domain.<\/p>\n<p>On this occasion I\u00a0was\u00a0trying to use RSAT to manage DHCP on an alternative domain. The connectivity is\u00a0in place with a Non-Transitive Trust between Domain A and Domain B but I was\u00a0trying to administer Domain C!<\/p>\n<p>The really simple fix was to use the command line &#8220;runas \/netonly&#8221; which allows MMC to run as an alternative user (in the destination domain) seamlessly &#8220;\/netonly&#8221; allows you to run applications as a local user but authenticating over the network as another user.<\/p>\n<pre lang=\"basic\">runas \/netonly \/user:domain\\username \"mmc dhcpmgmt.msc \/server=DC\"<\/pre>\n<p>Note: On Windows Server 2008 holding the &#8220;shift&#8221; key and right clicking on MMC will not display the &#8220;runas&#8221; function as in Windows Server 2008 R2 or Windows 7. A quick workaround is to use the &#8220;<a title=\"SysInternals ShellRunas\" href=\"http:\/\/goo.gl\/rmH1OF\" target=\"_blank\">ShellRunAs<\/a>&#8221; Sysinternals tools. Simply drag and drop the exe\/msc onto the tool and it will prompt to run with alternative credentials.<\/p>\n<p>References:\u00a0<a title=\"RunAs\" href=\"http:\/\/goo.gl\/9CZstN\" target=\"_blank\">http:\/\/ss64.com\/nt\/runas.html<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Problem when trying to use RSAT to remotely administer a different domain. &#8220;Security database on the server does not have a computer account for this workstation trust relationship&#8221; There are numerous blog\/forum posts regarding the cause of this\u00a0error, however most are related to workstations on the local domain not being able to authenticate to the [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"ngg_post_thumbnail":0,"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[18,23,44],"tags":[],"class_list":["post-2406","post","type-post","status-publish","format-standard","hentry","category-windows-server-2003","category-windows-server-2008","category-windows-server-2012"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_shortlink":"https:\/\/wp.me\/pOPt8-CO","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.edwardsd.co.uk\/work\/wp-json\/wp\/v2\/posts\/2406","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.edwardsd.co.uk\/work\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.edwardsd.co.uk\/work\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.edwardsd.co.uk\/work\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.edwardsd.co.uk\/work\/wp-json\/wp\/v2\/comments?post=2406"}],"version-history":[{"count":7,"href":"https:\/\/www.edwardsd.co.uk\/work\/wp-json\/wp\/v2\/posts\/2406\/revisions"}],"predecessor-version":[{"id":2417,"href":"https:\/\/www.edwardsd.co.uk\/work\/wp-json\/wp\/v2\/posts\/2406\/revisions\/2417"}],"wp:attachment":[{"href":"https:\/\/www.edwardsd.co.uk\/work\/wp-json\/wp\/v2\/media?parent=2406"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.edwardsd.co.uk\/work\/wp-json\/wp\/v2\/categories?post=2406"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.edwardsd.co.uk\/work\/wp-json\/wp\/v2\/tags?post=2406"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}