Released: Microsoft Kerberos Configuration Manager for SQL Server v3.1
We are pleased to announce the latest generally-available (GA) of Microsoft Kerberos Configuration Manager for SQL Server.
Get it here: Download Microsoft Kerberos Configuration Manager for SQL Server
Kerberos authentication provides a highly secure method to authenticate client and server entities (security principals) on a network. To use Kerberos authentication with SQL Server, a Service Principal Name (SPN) must be registered with Active Directory, which plays the role of the Key Distribution Center in a Windows domain. In addition, many customers also enable delegation for multi-tier applications using SQL Server. In such a setup, it may be difficult to troubleshoot the connectivity problems with SQL Server when Kerberos authentication fails.
The Kerberos Configuration Manager for SQL Server is a diagnostic tool that helps troubleshoot Kerberos related connectivity issues with SQL Server, SQL Server Reporting Services, and SQL Server Analysis Services. It can perform the following functions:
- Gather information on OS and Microsoft SQL Server instances installed on a server.
- Report on all SPN and delegation configurations on the server.
- Identify potential problems in SPNs and delegations.
- Fix potential SPN problems.
This release (v 3.1) adds support for SQL Server 2016.
Also, for reference, the Kerberos Configuration Manager for SQL Server creates a log file in %AppData%\Microsoft\KerberosConfigMgr.
Note: Microsoft Kerberos Configuration Manager for SQL Server requires a user with permission to connect to the WMI service on any machine its connecting to. For more information, refer to Securing a Remote WMI Connection.
Comments
- Anonymous
February 01, 2017
Just installed it in a local machine with SQL Server 2014 and got "Unable to access User Principal information from the System" error.What that means and how to solve this?Thank you.- Anonymous
February 01, 2017
Hello Vitor, are you running the tool in the machine itself, in a different machine in the same domain, or cross-domains?Can you also check the local Administrators group on that server (where you are running the tool), and check if there are orphaned entries (GUID instead of a resolved name). Users report that deleting those entries and restarting the Kerberos Configuration Manager tool solves the problem in this scenario.- Anonymous
February 02, 2017
The comment has been removed- Anonymous
February 02, 2017
We will be investigating this. Are you running the tool to connect remotely to those instances? And if so, are both your client and the target servers in the same domain?And can you please provide the log file in %appdata%\Microsoft\KerberosConfigMgr? Thank you!- Anonymous
February 03, 2017
There's always a log :)I'm running the tool locally in each of my 3 servers so I'm leaving the fields empty when trying to connect.Here's the log content:2/3/2017 4:36:22 AM Info: Connect to WMI, \root\cimv22/3/2017 4:36:34 AM Error: Access of system information failed System.Runtime.InteropServices.COMException (0x80070035): The network path was not found. at System.DirectoryServices.DirectoryEntry.Bind(Boolean throwIfFail) at System.DirectoryServices.DirectoryEntry.Bind() at System.DirectoryServices.DirectoryEntry.get_AdsObject() at System.DirectoryServices.PropertyValueCollection.PopulateList() at System.DirectoryServices.PropertyValueCollection..ctor(DirectoryEntry entry, String propertyName) at System.DirectoryServices.PropertyCollection.get_Item(String propertyName) at System.DirectoryServices.AccountManagement.SAMStoreCtx.ResolveCrossStoreRefToPrincipal(Object o) at System.DirectoryServices.AccountManagement.SAMMembersSet.MoveNextForeign() at System.DirectoryServices.AccountManagement.SAMMembersSet.MoveNext() at System.DirectoryServices.AccountManagement.FindResultEnumerator1.MoveNext() at System.Linq.Enumerable.Contains[TSource](IEnumerable
1 source, TSource value, IEqualityComparer`1 comparer) at KerberosCM.WMIHelper.TryIsUserLocalAdmin(SystemInfo si, UserPrincipal user, Boolean& isLocalAdmin)- Anonymous
February 03, 2017
Thank you Vitor, we will look at this ASAP.
- Anonymous
- Anonymous
- Anonymous
- Anonymous
- Anonymous
- Anonymous
February 01, 2017
This tool do not show SPN for Reporting Services (SQL Server 2016 Ent SP1) Status field - "Unable to access the Reporting Services information. Verify the integrity of Reporting Services.". My SSRS works fine.- Anonymous
February 02, 2017
Hello, can you please make the log available for investigation? You can find the log in %appdata%\Microsoft\KerberosConfigMgr. Thank you- Anonymous
May 03, 2017
Hi,I have a similar issues as MaxRem. I'm also seeing “Unable to access the Reporting Services information. Verify the integrity of Reporting Services.” on a SQL 2014 (12.0.5000.0) SSRS Standard instance. Where can I send my log too?- Anonymous
June 05, 2017
Hello John, we are looking at how to address SSRS issues in a future release.
- Anonymous
- Anonymous
- Anonymous
- Anonymous
February 01, 2017
The comment has been removed- Anonymous
February 01, 2017
Hello Nicolas, presently it does not account for listeners in AG configurations. Thanks for the feedback and stay tuned.- Anonymous
February 08, 2017
The comment has been removed
- Anonymous
- Anonymous
- Anonymous
February 01, 2017
When I try to connect to a remote machine in the same domain with the tool I get the "Unable to access User Principal information from the System" error message. Any ideas?- Anonymous
February 01, 2017
Hello Khoi, are you running the tool in the machine itself, in a different machine in the same domain, or cross-domains?Can you also check the local Administrators group on that server (where you are running the tool), make sure that you are in it (or run the tool in an elevated credentials, and look if there are orphaned entries (GUID instead of a resolved name). Users report that deleting those entries and restarting the Kerberos Configuration Manager tool solves the problem in this scenario.
- Anonymous
- Anonymous
February 03, 2017
Is there a way to configure the SPNs? The tool generates two SPNs in the form of:MSSQLSvc\fqnMSSQLSvc\fqn:portWhere all of our SPNs have been generated in the form of:MSSQLSvc\servername:portMSSQLSvc\fqn:portThe latter is the way we have always created our SPNs, and they are proven to work. Updating the configuration of the tool would allow us to use it without erroneous "Missing" reports, and generating cmd scripts that are unusable.- Anonymous
February 03, 2017
Hello Karl, there is no config or bypass for non-FQDN based SPNs. The tool generates (and checks) for SPNs as documented in https://msdn.microsoft.com/en-us/library/ms191153.aspx. This is also the SPN that is registered if you allow the service to self manage SPNs.Thank you for your feedback. We will evaluate for a future release.
- Anonymous
- Anonymous
February 08, 2017
Hello,Is there a way to import a list of servers from XML or text file? Checking each of our servers one at a time can be quite laborious. I was hoping the export/import XML would allow this option, but exporting also captures the results and server configuration details.- Anonymous
February 08, 2017
Hello, there is not. Thanks for the suggestion!- Anonymous
February 09, 2017
Alright, thanks for the confirmation. It would be great if this makes its way into a future release.
- Anonymous
- Anonymous