Testing configuration of the Kerberos account assigned to a site in Lync Server 2013

Lync Server 2013
 

Letztes Änderungsdatum des Themas: 2015-03-09

 

Verification schedule

Daily

Testing tool

Windows PowerShell

Permissions required

When run locally using the Lync Server-Verwaltungsshell, users must be members of the RTCUniversalServerAdmins security group.

When run using a remote instance of Windows PowerShell, users must be assigned an RBAC role that has permission to run the Test-CsKerberosAccountAssignment cmdlet. To see a list of all RBAC roles that can use this cmdlet, run the following command from the Windows PowerShell prompt:

Get-CsAdminRole | Where-Object {$_.Cmdlets -match "Test-CsKerberosAccountAssignment"}

The Test-CsKerberosAccountAssignment cmdlet enables you to verify that a Kerberos account is associated with a given site, that this account is configured correctly, and that the account is working as expected. Kerberos accounts are computer accounts that can serve as the authentication principal for all the computers in a site that are running Internet Information Server (IIS). Because these accounts use the Kerberos authentication protocol, the accounts are known as Kerberos accounts, and the new authentication process is known as Kerberos web authentication. This enables you to manage all IIS servers by using a single account.

For more information, see the Help documentation for the Test-CsKerberosAccountAssignment cmdlet.

By default, Test-CsKerberosAccountAssignment displays very little output on-screen. Instead, information returned by the cmdlet is written to an HTML file. Because of that, we recommend that you include the Verbose parameter and the Report parameter any time that you run Test-CsKerberosAccountAssignment. The Verbose parameter will provide slightly more detailed output on-screen while the cmdlet runs. The Report parameter allows you to specify a file path and file name for the HTML file generated by Test-CsKerberosAccountAssignment. If you do not include the Report parameter the HTML file will automatically be saved to your Users folder and be given a name similar to this: ce84964a-c4da-4622-ad34-c54ff3ed361f.html.

You must also specify a site Identity when you run Test-CsKerberosAccountAssignment. Kerberos accounts are assigned at the site scope.

The following command runs Test-CsKerberosAccountAssignment and saves the output to a file that is named C:\Logs\KerberosTest.html:

Test-CsKerberosAccountAssignment -Identity "site:Redmond" -Report "C:\Logs\KerberosTest.html" -Verbose

For more information, see the Help documentation for the Test-CsKerberosAccountAssignment cmdlet.

The Test-CsKerberosAccountAssignment cmdlet does not return a simple indication of success or failure. Instead, you must view the generated HTML file by using Internet Explorer.

Here are some common reasons why Test-CsKerberosAccountAssignment might fail:

  • You might have specified an incorrect site Identity. To return a list of valid site Identity, use this command:

    Get-CsSite | Select-Identity Identity
    

    A site Identity typically looks as follows:

    site:Redmond

  • The specified site might not have a Kerberos account assigned to it. You can determine whether or not a Kerberos account is assigned to a site by running a command similar to this:

    Get-CsKerberosAccountAssignment -Identity "site:Redmond"
    
  • Your Kerberos account might have a password that isn't valid. If you receive the following error message in report, you'll probably have to reset the Kerberos account password:

    InvalidKerberosConfiguration: The Kerberos configuration is invalid.

    InvalidKerberosConfiguration: The Kerberos configuration on atl-cs001.litwareinc.com is invalid. The expected assigned account is litwareinc\kerberostest. Ensure that the account has not expired, and the configured password on the machine matches the Active Directory password of the account.

    You can set the password using the Set-CsKerberosAccountPassword cmdlet.

 
Anzeigen: