Skip to content

Commit a186454

Browse files
Learn Build Service GitHub AppLearn Build Service GitHub App
authored andcommitted
Merging changes synced from https://github.com/MicrosoftDocs/SupportArticles-docs-pr (branch live)
2 parents 332ce10 + cff0768 commit a186454

14 files changed

Lines changed: 1504 additions & 551 deletions

support/power-platform/power-apps/manage-apps/wrap-issues.md

Lines changed: 251 additions & 144 deletions
Large diffs are not rendered by default.

support/windows-client/performance/generate-a-kernel-or-complete-crash-dump.md

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,14 +1,14 @@
11
---
22
title: Generate a kernel or complete crash dump
33
description: Learn how to generate a kernel or complete crash dump, and then use the output to troubleshoot several issues.
4-
ms.date: 06/06/2025
4+
ms.date: 06/17/2025
55
ms.topic: troubleshooting
66
manager: dcscontentpm
77
ms.collection: highpri
88
ms.custom:
99
- sap:system performance\system reliability (crash,errors,bug check or blue screen,unexpected reboot)
1010
- pcy:WinComm Performance
11-
ms.reviewer: willchen
11+
ms.reviewer: willchen, chcart
1212
audience: itpro
1313
---
1414
# Generate a kernel or complete crash dump
@@ -58,7 +58,8 @@ If you can sign in while the problem is occurring, you can use the Microsoft Sys
5858
3. At the command line, run the following command:
5959

6060
```console
61-
notMyfault.exe /crash
61+
notmyfaultc64.exe /getdumptype = full
62+
notmyfaultc64.exe /crash 0x01
6263
```
6364

6465
> [!NOTE]

support/windows-server/toc.yml

Lines changed: 12 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -2910,10 +2910,14 @@ items:
29102910
href: ./windows-security/constrained-delegation-access-denied.md
29112911
- name: Event ID 27 KDC error on domain controllers
29122912
href: ./windows-security/event-id-27-kdc-errors.md
2913+
- name: Event ID 5719, Error 1311, or Error 1355 - Domain controller or domain not found
2914+
href: ./windows-security/troubleshoot-kerberos-domain-not-found-event-id-5719.md
29132915
- name: How to disable the Subject Alternative Name for UPN mapping
29142916
href: ./windows-security/disable-subject-alternative-name-upn-mapping.md
29152917
- name: How to force Kerberos to use TCP instead of UDP
29162918
href: ./windows-security/force-kerberos-use-tcp-instead-udp.md
2919+
- name: KDC_ERR_S_PRINCIPAL_UNKNOWN or KDC_ERR_PRINCIPAL_NOT_UNIQUE error
2920+
href: ./windows-security/kerberos-error-kdc-err-s-principal-unknown-or-not-unique.md
29172921
- name: KDC event 16 or 27 if DES for Kerberos is disabled
29182922
href: ./windows-security/kdc-event-16-27-des-encryption-disabled.md
29192923
- name: KDC service on an RODC can't start and generates error 1450
@@ -2938,6 +2942,14 @@ items:
29382942
href: ./windows-security/tgs-request-for-krbtgt-account-fails.md
29392943
- name: The Fingerprint Registration Wizard doesn't run
29402944
href: ./windows-security/fingerprint-registration-wizard-not-run-install-fingerprint-reader.md
2945+
- name: Troubleshoot constrained delegation issues
2946+
href: ./windows-security/troubleshoot-kerberos-constrained-delegation-issues.md
2947+
- name: Troubleshoot Kerberos using a log analysis test scenario
2948+
href: ./windows-security/kerberos-authentication-log-analysis-test-scenario.md
2949+
- name: 'Troubleshoot resource-based constrained delegation issues'
2950+
href: ./windows-security/troubleshoot-kerberos-rbcd-issues.md
2951+
- name: Troubleshoot SSO issues
2952+
href: ./windows-security/troubleshoot-kerberos-sso-issues.md
29412953
- name: Legacy authentication (NTLM)
29422954
items:
29432955
- name: Audit event shows authentication package as NTLMv1

support/windows-server/windows-security/kerberos-authentication-log-analysis-test-scenario.md

Lines changed: 436 additions & 0 deletions
Large diffs are not rendered by default.

support/windows-server/windows-security/kerberos-authentication-troubleshooting-guidance.md

Lines changed: 289 additions & 404 deletions
Large diffs are not rendered by default.
Lines changed: 143 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,143 @@
1+
---
2+
title: Kerberos Generates KDC_ERR_S_PRINCIPAL_UNKNOWN or KDC_ERR_PRINCIPAL_NOT_UNIQUE Error
3+
description: Guidance for troubleshooting missing, incorrect, or duplicate SPNs that cause Kerberos authentication issues.
4+
ms.date: 06/15/2025
5+
manager: dcscontentpm
6+
audience: itpro
7+
ms.topic: troubleshooting
8+
ms.custom:
9+
- sap:windows security technologies\kerberos authentication
10+
- pcy:WinComm Directory Services
11+
ms.reviewer: kaushika, raviks, v-lianna, jobesanc
12+
keywords: KDC_ERR_S_PRINCIPAL_UNKNOWN, KDC_ERR_PRINCIPAL_NOT_UNIQUE
13+
---
14+
15+
# Kerberos generates KDC_ERR_S_PRINCIPAL_UNKNOWN or KDC_ERR_PRINCIPAL_NOT_UNIQUE error
16+
17+
The KDC_ERR_S_PRINCIPAL_UNKNOWN and KDC_ERR_PRINCIPAL_NOT_UNIQUE errors indicate that the client is requesting access to a service that Kerberos can't identify. This kind of error indicates one or more of the following issues:
18+
19+
- The service account isn't configured correctly.
20+
- The service isn't using the service account that's configured for it.
21+
- More than one account is configured for the service.
22+
- The client didn't correctly request the service.
23+
24+
Each service has a service principal name (SPN) that identifies it to clients and other services. The SPN is an attribute of the Active Directory Domain Services (AD DS) account that the service uses. A service can run in the context of a custom service account or in the context of a built-in account, such as the computer account of the local computer. The service can also run in a security context that's related to the computer account, such as Local System or Network Service.
25+
26+
The manner is which you configure SPNs differs depending on the type of account that your service uses:
27+
28+
- A custom service account must have an explicit SPN for each service that uses the account.
29+
- The computer account might have explicit SPNs that are configured for the services that use it. However, common service classes map automatically to the HOST SPN. The HOST SPN is automatically generated for each computer account. In such cases, some services might not have their own SPN that's configured on the computer account.
30+
31+
> [!IMPORTANT]
32+
>
33+
> - Unless a service uses the computer account and the HOST SPN, SPNs must be unique in the AD DS forest. In a multi-forest environment, the SPN must be unique across all the associated forests.
34+
> - One SPN can be associated with only one account. A common cause of SPN issues is configuring a service to use a custom account even though the SPN is associated with both the custom account and the computer account.
35+
36+
## Collect trace data and identify the problem SPN
37+
38+
If you haven't yet collected trace data for the issue, do that now. For more information, see [Kerberos authentication troubleshooting guidance: 3. Collect trace and ticket data](kerberos-authentication-troubleshooting-guidance.md#3-collect-trace-and-ticket-data). Check the trace data to find the SPN that the client requested.
39+
40+
## Check the SPN that the service account uses
41+
42+
These procedures differ slightly depending on whether the service uses a custom account or the computer account. The following table summarizes the difference.
43+
44+
| Service uses a custom account | Service uses the computer account |
45+
| - | - |
46+
| The requested SPN has to match the account SPN.<br/><br/>The SPN must be unique in the forest. | The requested SPN might match one of account SPNs. However, common services (such as the web service) typically use the automatic HOST SPN instead of a unique SPN.<br/><br/>If the account does have an SPN that's specific to the service, that SPN must be unique in the forest. |
47+
48+
1. Get a list of SPNs that are assigned to the service account. To do this, open an administrative Command Prompt window on a domain controller, and then run the following command:
49+
50+
```console
51+
setspn -L <Name>
52+
```
53+
54+
> [!NOTE]
55+
>
56+
> - In this command, \<Name> represents the name of either the computer that runs the service or a custom account that the service uses.
57+
> - In a multi-domain environment, use the \<Domain\\Name> format to specify the account's domain.
58+
59+
1. Search for any accounts that use the requested SPN. This search identifies any duplicate SPNs or SPNs that are assigned to the incorrect account.
60+
61+
> [!NOTE]
62+
> To perform this procedure, you have to have at least Enterprise Administrator permissions.
63+
64+
To determine the account or accounts that are associated with the SPN, open an administrative Command Prompt window, and then run one of the following commands.
65+
66+
| Single forest | Multiple trusted forests |
67+
| - | - |
68+
| `setspn -Q <SPN>` | `setspn -X <SPN>` |
69+
70+
> [!NOTE]
71+
> - In this command, \<SPN> represents the SPN that you're searching for.
72+
> - Searching for duplicates, especially forest-wide, can take a long time and lots of memory.
73+
74+
For more information about the `setspn` command and the available options, see [setspn](/windows-server/administration/windows-commands/setspn).
75+
76+
## Reconfigure the SPN as necessary
77+
78+
The next steps depend on the result of the trace data, the `setspn` queries, and the type of account that your service uses.
79+
80+
You might see any of the following issues.
81+
82+
| Custom account | Computer account |
83+
| - | - |
84+
| One or more accounts other than the service account has the SPN. | One or more accounts other than the computer account has the SPN. |
85+
| The custom account doesn't have the SPN. | The computer account should have the SPN, but it doesn't.<sup>1</sup> |
86+
| The custom account has an incorrect SPN or an SPN that doesn't match the SPN that the client requested.<sup>2</sup> | The computer account has an incorrect SPN or an SPN that doesn't match the SPN that the client requested.<sup>2</sup> |
87+
88+
<sup>1</sup> For a list of the services that can use the HOST SPN of the computer account, see [setspn](/windows-server/administration/windows-commands/setspn). If your service isn't one of these common services, you have to configure an SPN for the service on the computer account.
89+
90+
<sup>2</sup> For the client request information, see the network trace data.
91+
92+
Use the following methods to fix the SPN configuration:
93+
94+
- If the service account is configured correctly but the client requested an incorrect SPN, see [Fix an inconsistent SPN](#fix-an-inconsistent-spn).
95+
96+
- If the correct service account has the SPN but the SPN isn't correct, remove the incorrect SPN, and then add the correct SPN. For details, see [Remove an SPN from an account](#remove-an-spn-from-an-account) and [Add an SPN to a service account](#add-an-spn-to-a-service-account).
97+
98+
- If the SPN is assigned to any account other than the correct service account (custom account or computer account), remove the SPN from those accounts. See [Remove an SPN from an account](#remove-an-spn-from-an-account).
99+
100+
- If your service uses a custom account but the custom account doesn't have an assigned SPN, add the SPN. For details, see [Add an SPN to a service account](#add-an-spn-to-a-service-account).
101+
102+
- If your service uses the computer account but isn't one of the common services that are described in this article, [add the SPN](#add-an-spn-to-a-service-account) to the computer account.
103+
104+
### Remove an SPN from an account
105+
106+
To remove the SPN from an account, run the following command at an administrative command prompt:
107+
108+
```console
109+
setspn -D <SPN> <AccountName>
110+
```
111+
112+
> [!NOTE]
113+
> In this command, \<SPN> represents the SPN that you want to remove. \<AccountName> represents the account (or one of the accounts) that you want to remove the SPN from.
114+
115+
### Add an SPN to a service account
116+
117+
To add the SPN to an account, run the following command at an administrative command prompt:
118+
119+
```console
120+
setspn -S \<SPN> \<AccountName>
121+
```
122+
123+
> [!NOTE]
124+
> In this command, \<SPN> represents the SPN that you want to add. \<AccountName> represents the account (or one of the accounts) that you want to add the SPN to.
125+
126+
### Fix an inconsistent SPN
127+
128+
Determine which version of the SPN is correct: Either the one that the client requested or the one that's configured on the service account.
129+
130+
If the client is requesting an incorrect SPN, verify the information that your client uses to build an SPN for a request, and make sure that the source information is correct. DNS is a common source of this information. Other clients (especially non-browser or custom clients) might use other sources in addition to DNS.
131+
132+
If the service account uses the incorrect SPN, [remove the SPN from the service account](#remove-an-spn-from-an-account), and then [add the correct SPN](#add-an-spn-to-a-service-account).
133+
134+
## More information
135+
136+
An SPN uses the \<ServiceClass>/\<Host>:\<Port>/,\<ServiceName> format and includes the following components:
137+
138+
- \<ServiceClass> (required) represents the service class of the service.
139+
- \<Host> (required) represents the name of the computer that runs the service.
140+
- \<Port> (optional) represents the port number that the service uses.
141+
- \<ServiceName> (optional) represents the name of the service.
142+
143+
For more information about how to format SPNs and when to use optional parameters, see [Name Formats for Unique SPNs](/windows/win32/ad/name-formats-for-unique-spns).

support/windows-server/windows-security/media/kerberos-authentication-troubleshooting-guidance/authentication-flow.png renamed to support/windows-server/windows-security/media/kerberos-authentication-log-analysis-test-scenario/authentication-flow.png

File renamed without changes.

support/windows-server/windows-security/media/kerberos-authentication-troubleshooting-guidance/enabled-providers-negotiate.png renamed to support/windows-server/windows-security/media/kerberos-authentication-log-analysis-test-scenario/enabled-providers-negotiate.png

File renamed without changes.

support/windows-server/windows-security/media/kerberos-authentication-troubleshooting-guidance/internet-options-local-intranet-zone.png renamed to support/windows-server/windows-security/media/kerberos-authentication-log-analysis-test-scenario/internet-options-local-intranet-zone.png

File renamed without changes.

support/windows-server/windows-security/media/kerberos-authentication-troubleshooting-guidance/windows-authentication-enabled.png renamed to support/windows-server/windows-security/media/kerberos-authentication-log-analysis-test-scenario/windows-authentication-enabled.png

File renamed without changes.

0 commit comments

Comments
 (0)