Event ID 4 — Kerberos Client Configuration
Updated: December 16, 2008
Applies To: Windows Server 2008 R2
If the client computers are joined to an Active Directory domain, the Kerberos client is configured to request ticket-granting tickets (TGTs) from the Kerberos Key Distribution Center (KDC) automatically. On successful receipt of the ticket, the Kerberos client caches the ticket on the local computer.
|Product:||Windows Operating System|
|Message:||The kerberos client received a KRB_AP_ERR_MODIFIED error from the server %1. The target name used was %3. This indicates that the password used to encrypt the kerberos service ticket is different than that on the target server. Commonly, this is due to identically named server accounts in the target realm (%2), and the client realm (%4). Please contact your system administrator.|
Delete an unused computer account by using Active Directory Users and Computers
A Kerberos ticket is encrypted by using the client computer account's password for the resulting encryption used on the ticket. If the computer account's password changes during the authentication process, the ticket cannot be decrypted. This can happen if a computer account was moved to a different forest and the original computer account object was not deleted. To resolve this issue, you should use Active Directory Users and Computers to delete the original computer account that is no longer used.
Note: The computer account is identified in the event log message.
To perform this procedure, you must be a member of the Domain Admins group, or you must have been delegated the appropriate authority.
To delete a computer account by using Active Directory Users and Computers:
- Log on to a domain controller or another computer that has the Remote Server Adminstration Tools installed.
- Click Start, point to Administrative Tools, and then click Active Directory Users and Computers.
- Locate the computer account in Active Directory Domain Services (AD DS).
- Right-click the computer account, and then click Delete.
To verify that the Kerberos client is correctly configured, you should ensure that a Kerberos ticket was received from the Key Distribution Center (KDC) and cached on the local computer. You can view cached Kerberos tickets on the local computer by using the Klist command-line tool.
Note: Klist.exe is not included with Windows Vista, Windows Server 2003, Windows XP, or Windows 2000. You must download and install the Windows Server Resource Kit before you can use Klist.exe.
To view cached Kerberos tickets by using Klist:
- Log on to the Kerberos client computer.
- Click Start, point to All Programs, click Accessories, and then click Command Prompt.
- Type klist tickets, and then press ENTER.
- Verify that a cached Kerberos ticket is available.
- Ensure that the Client field displays the client on which you are running Klist.
- Ensure that the Server field displays the domain in which you are connecting.
- Close the command prompt.