Error 18452 connecting from Windows domain joined to Managed Instance with Windows Authentication

您所在的位置:网站首页 sql 错误18452 Error 18452 connecting from Windows domain joined to Managed Instance with Windows Authentication

Error 18452 connecting from Windows domain joined to Managed Instance with Windows Authentication

#Error 18452 connecting from Windows domain joined to Managed Instance with Windows Authentication| 来源: 网络整理| 查看: 265

Connecting from Windows Server (running on Azure On-Premises domain joined), to Managed Instance, while using Windows Authentication method, fails with below error message:

 

 

Georgiana_Pache_0-1678914991837.png

 

The steps we have been through, troubleshooting this issue, are as follows:

 

we have created a Trusted Domain Object with SetupCloudTrust, then created GPO (Group Policy Object) setting to client machines using the incoming trust-based flow: https://learn.microsoft.com/en-us/azure/azure-sql/managed-instance/winauth-azuread-setup-incoming-tr...

 

Georgiana_Pache_1-1678914991844.png

 

checking klist, we were seeing the below: Error calling API LsaCallAuthenticationPackage:

 

Georgiana_Pache_2-1678914991851.png

as per Configure Azure SQL Managed Instance for Windows Authentication for Azure Active Directory - Azure S..., we have tried to enable a system assigned service principal for the Managed Instance, but at this point, the option failed with "user attempted to use a feature which is disabled":Georgiana_Pache_3-1678915214324.png

 

the reason we were seeing "user attempted to use a feature which is disabled", is because the Managed Instance, was part of a Managed Instance Pool. So when you try to set system assigned service principal via Azure Portal, the portal  will send a PATCH request which only contains properties which should be updated, so the InstancePoolName property, is not sent in the request body.  this issue doesn't manifest with Azure CLI and Azure PowerShell, because both clients first fetch the instance (thus getting all of its properties), update the specified properties and then issue a PUT request which contains all of the Managed Instance's properties. Hence, we have been able to set up the system assigned service principal, via: az sql mi | Microsoft Learn as we were still unable to login to the Managed Instance, we reviewed carefully this article: How to set up Windows Authentication for Azure Active Directory with the incoming trust-based flow -... it seems that the issue was coming in from the space needed between kerberos and the / 

 

 

Georgiana_Pache_5-1678915698838.jpeg

This was able to fix our problem!

 

If you still encounter any issues on this topic, you can check the logs for more details: Enable Kerberos event logging - Windows Server | Microsoft Learn

 



【本文地址】


今日新闻


推荐新闻


CopyRight 2018-2019 办公设备维修网 版权所有 豫ICP备15022753号-3