Skip to content

Commit 122accd

Browse files
Revise sIDHistory migration documentation for ADMT
Updated the title and description to remove versioning and clarify the use of Active Directory Migration Tool (ADMT). Adjusted various sections for consistency and accuracy regarding sIDHistory migration requirements.
1 parent d1c7bf4 commit 122accd

1 file changed

Lines changed: 10 additions & 10 deletions

File tree

support/windows-server/active-directory/inter-forest-sidhistory-migration-with-admt.md

Lines changed: 10 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
2-
title: Troubleshoot sIDHistory migration with ADMTv2
3-
description: Describes how to troubleshoot inter-forest sIDHistory migration by using Active Directory Migration Tool version 2 (ADMTv2).
2+
title: Troubleshoot sIDHistory migration with ADMT
3+
description: Describes how to troubleshoot inter-forest sIDHistory migration by using Active Directory Migration Tool (ADMT).
44
ms.date: 01/15/2025
55
manager: dcscontentpm
66
audience: itpro
@@ -12,9 +12,9 @@ ms.custom:
1212
appliesto:
1313
- <a href=https://learn.microsoft.com/windows/release-health/windows-server-release-info target=_blank>Supported versions of Windows Server</a>
1414
---
15-
# How to troubleshoot inter-forest sIDHistory migration with ADMTv2
15+
# How to troubleshoot inter-forest sIDHistory migration with ADMT
1616

17-
This article describes how to troubleshoot inter-forest sIDHistory migration with Active Directory Migration Tool version 2 (ADMTv2).
17+
This article describes how to troubleshoot inter-forest sIDHistory migration with Active Directory Migration Tool (ADMT).
1818

1919
_Original KB number:_ &nbsp; 322970
2020

@@ -33,14 +33,15 @@ The basic requirements for inter-forest migration operations are:
3333
#### Wizard-based basic user and group account migration without sIDHistory
3434

3535
- The source domain must trust the target domain.
36-
- The user account that is running ADMTv2 must have Administrator rights in the source domain.
36+
- The user account that is running ADMT must have Administrator rights in the source domain.
3737
- The ADMT user account must have delegated permissions to create user or group objects in the target container.
3838
- DNS (hostname) and NetBIOS name resolution between the domains must exist.
3939

4040
#### sIDHistory migration requires the following additional dependencies
4141

4242
- Success and failure auditing of account management for both source and target domains.
4343
- Source domains call this user and group management auditing.
44+
- Both domains need to run in native mode. To be on the safe side, use the highest Domain and Forest functional levels possible.
4445
- An empty local group in the source domain that is named *{SourceNetBIOSDom}$$$*.
4546
- The `HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\LSA\TcpipClientSupport`registry key must be set to 1 on the source domain primary domain controller.
4647
- You must restart the source domain primary domain controller after the registry configuration.
@@ -53,8 +54,7 @@ To delegate the MigrateSidHistory extended right on a domain controller or on a
5354
3. Click **Next**, click **Add**, enter the name of the user or group that you wish to add in the **Select Users, Computers, or Groups** dialog box, click **OK**, and then click **Next**.
5455
4. Click to select the **Create a custom task to delegate** option, and then click **Next**.
5556
5. Make sure that the **This folder, existing objects in this folder, and creation of new objects in this folder** option is selected, and then click **Next**.
56-
6. Make sure that the **General** option is selected, click **Migrate SID History** in the
57-
**Permissions** list, and then click **Next**.
57+
6. Make sure that the **General** option is selected, click **Migrate SID History** in the **Permissions** list, and then click **Next**.
5858
7. Verify that the information is correct, and then click **Finish**.
5959
- No sID to be migrated may exist in the target forest, either as a primary sID or as an sIDHistory attribute of another object.
6060

@@ -71,7 +71,7 @@ To delegate the MigrateSidHistory extended right on a domain controller or on a
7171

7272
The most basic step you can use to troubleshoot inter-forest sIDHistory migration is to use the User Account Migration Wizard or the Group Account Migration Wizard to run a test-mode migration.
7373

74-
During the test-mode migration, ADMTv2 validates the following dependencies:
74+
During the test-mode migration, ADMT validates the following dependencies:
7575

7676
- The {SourceNetBIOSDom}$$$ local group is created.
7777
- TcpipClientSupport on the source primary domain controller or primary domain controller emulator is turned on.
@@ -102,7 +102,7 @@ This error in the Migration.log file after a migration with sIDHistory typically
102102

103103
## Additional sIDHistory information
104104

105-
The sIDHistory is a multivalued attribute of security principals in the Active Directory that may hold up to 850 values. To provide backward-compatibility with domain controllers that are running earlier versions of Windows, the sIDHistory attribute is only available in domains that are operating at the functional level of Windows.
105+
The sIDHistory is a multivalued attribute of security principals in the Active Directory that may hold up to 1300 values. To provide backward-compatibility with domain controllers that are running earlier versions of Windows, the sIDHistory attribute is only available in domains that are operating at the functional level of Windows.
106106

107107
Some third-party vendor products make it possible to turn on sIDHistory in mixed mode domains. These claims do not represent the legitimate use of public APIs. Domain administrators that use such tools risk putting their Active Directory deployment in an unsupported state.
108108

@@ -112,4 +112,4 @@ In both cases, migrated objects are assigned a new sID by the target domain. The
112112

113113
Note that the sIDHistory is a transitional tool and is not meant to exist indefinitely attached to security principals. Although migrating the sIDHistory can significantly ease and simplify the domain migration process, there are important security ramifications that must be considered before you implement the sIDHistory in a production enterprise.
114114

115-
A Windows security token can hold a maximum of 1,023 sIDs, including sIDHistory and group sIDs. Kerberos is also limited because Windows Kerberos has a 73-sID buffer. This size can be doubled by an enterprise-wide registry change. Exceeding these limits violates the MaxTokenSize restriction and can lead to unpredictable results, including failure of Kerberos authentication and erratic or nonexistent application of policies. To prevent these issues, use Security Translation instead of sIDHistory as the long-term solution to maintaining resource access after a domain migration.
115+
A Windows security token can hold a maximum of 1,023 sIDs, including sIDHistory and group sIDs. To prevent these issues, use Security Translation instead of sIDHistory as the long-term solution to maintaining resource access after a domain migration. You also may need to clean up old Sids from other Sid stores outside the reach of Windows tools. This investigation may be complex, but is required to be able to evnetually remove SidHistory.

0 commit comments

Comments
 (0)