You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Revise sIDHistory migration documentation for ADMT
Updated the title and description to remove versioning and clarify the use of Active Directory Migration Tool (ADMT). Adjusted various sections for consistency and accuracy regarding sIDHistory migration requirements.
Copy file name to clipboardExpand all lines: support/windows-server/active-directory/inter-forest-sidhistory-migration-with-admt.md
+10-10Lines changed: 10 additions & 10 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,6 +1,6 @@
1
1
---
2
-
title: Troubleshoot sIDHistory migration with ADMTv2
3
-
description: Describes how to troubleshoot inter-forest sIDHistory migration by using Active Directory Migration Tool version 2 (ADMTv2).
2
+
title: Troubleshoot sIDHistory migration with ADMT
3
+
description: Describes how to troubleshoot inter-forest sIDHistory migration by using Active Directory Migration Tool (ADMT).
4
4
ms.date: 01/15/2025
5
5
manager: dcscontentpm
6
6
audience: itpro
@@ -12,9 +12,9 @@ ms.custom:
12
12
appliesto:
13
13
- <a href=https://learn.microsoft.com/windows/release-health/windows-server-release-info target=_blank>Supported versions of Windows Server</a>
14
14
---
15
-
# How to troubleshoot inter-forest sIDHistory migration with ADMTv2
15
+
# How to troubleshoot inter-forest sIDHistory migration with ADMT
16
16
17
-
This article describes how to troubleshoot inter-forest sIDHistory migration with Active Directory Migration Tool version 2 (ADMTv2).
17
+
This article describes how to troubleshoot inter-forest sIDHistory migration with Active Directory Migration Tool (ADMT).
18
18
19
19
_Original KB number:_ 322970
20
20
@@ -33,14 +33,15 @@ The basic requirements for inter-forest migration operations are:
33
33
#### Wizard-based basic user and group account migration without sIDHistory
34
34
35
35
- The source domain must trust the target domain.
36
-
- The user account that is running ADMTv2 must have Administrator rights in the source domain.
36
+
- The user account that is running ADMT must have Administrator rights in the source domain.
37
37
- The ADMT user account must have delegated permissions to create user or group objects in the target container.
38
38
- DNS (hostname) and NetBIOS name resolution between the domains must exist.
39
39
40
40
#### sIDHistory migration requires the following additional dependencies
41
41
42
42
- Success and failure auditing of account management for both source and target domains.
43
43
- Source domains call this user and group management auditing.
44
+
- Both domains need to run in native mode. To be on the safe side, use the highest Domain and Forest functional levels possible.
44
45
- An empty local group in the source domain that is named *{SourceNetBIOSDom}$$$*.
45
46
- The `HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\LSA\TcpipClientSupport`registry key must be set to 1 on the source domain primary domain controller.
46
47
- You must restart the source domain primary domain controller after the registry configuration.
@@ -53,8 +54,7 @@ To delegate the MigrateSidHistory extended right on a domain controller or on a
53
54
3. Click **Next**, click **Add**, enter the name of the user or group that you wish to add in the **Select Users, Computers, or Groups** dialog box, click **OK**, and then click **Next**.
54
55
4. Click to select the **Create a custom task to delegate** option, and then click **Next**.
55
56
5. Make sure that the **This folder, existing objects in this folder, and creation of new objects in this folder** option is selected, and then click **Next**.
56
-
6. Make sure that the **General** option is selected, click **Migrate SID History** in the
57
-
**Permissions** list, and then click **Next**.
57
+
6. Make sure that the **General** option is selected, click **Migrate SID History** in the **Permissions** list, and then click **Next**.
58
58
7. Verify that the information is correct, and then click **Finish**.
59
59
- No sID to be migrated may exist in the target forest, either as a primary sID or as an sIDHistory attribute of another object.
60
60
@@ -71,7 +71,7 @@ To delegate the MigrateSidHistory extended right on a domain controller or on a
71
71
72
72
The most basic step you can use to troubleshoot inter-forest sIDHistory migration is to use the User Account Migration Wizard or the Group Account Migration Wizard to run a test-mode migration.
73
73
74
-
During the test-mode migration, ADMTv2 validates the following dependencies:
74
+
During the test-mode migration, ADMT validates the following dependencies:
75
75
76
76
- The {SourceNetBIOSDom}$$$ local group is created.
77
77
- TcpipClientSupport on the source primary domain controller or primary domain controller emulator is turned on.
@@ -102,7 +102,7 @@ This error in the Migration.log file after a migration with sIDHistory typically
102
102
103
103
## Additional sIDHistory information
104
104
105
-
The sIDHistory is a multivalued attribute of security principals in the Active Directory that may hold up to 850 values. To provide backward-compatibility with domain controllers that are running earlier versions of Windows, the sIDHistory attribute is only available in domains that are operating at the functional level of Windows.
105
+
The sIDHistory is a multivalued attribute of security principals in the Active Directory that may hold up to 1300 values. To provide backward-compatibility with domain controllers that are running earlier versions of Windows, the sIDHistory attribute is only available in domains that are operating at the functional level of Windows.
106
106
107
107
Some third-party vendor products make it possible to turn on sIDHistory in mixed mode domains. These claims do not represent the legitimate use of public APIs. Domain administrators that use such tools risk putting their Active Directory deployment in an unsupported state.
108
108
@@ -112,4 +112,4 @@ In both cases, migrated objects are assigned a new sID by the target domain. The
112
112
113
113
Note that the sIDHistory is a transitional tool and is not meant to exist indefinitely attached to security principals. Although migrating the sIDHistory can significantly ease and simplify the domain migration process, there are important security ramifications that must be considered before you implement the sIDHistory in a production enterprise.
114
114
115
-
A Windows security token can hold a maximum of 1,023 sIDs, including sIDHistory and group sIDs. Kerberos is also limited because Windows Kerberos has a 73-sID buffer. This size can be doubled by an enterprise-wide registry change. Exceeding these limits violates the MaxTokenSize restriction and can lead to unpredictable results, including failure of Kerberos authentication and erratic or nonexistent application of policies. To prevent these issues, use Security Translation instead of sIDHistory as the long-term solution to maintaining resource access after a domain migration.
115
+
A Windows security token can hold a maximum of 1,023 sIDs, including sIDHistory and group sIDs. To prevent these issues, use Security Translation instead of sIDHistory as the long-term solution to maintaining resource access after a domain migration. You also may need to clean up old Sids from other Sid stores outside the reach of Windows tools. This investigation may be complex, but is required to be able to evnetually remove SidHistory.
0 commit comments