ADMT Migration breaks groups with trusted domain members

Jay Griffin 1 Reputation point
2020-08-11T21:11:01.687+00:00

I am preparing and testing to do an ADMT migration from a trusted forest migrating to a child domain. I migrated some users as a test. Some of our web applications broke when the app tried to check group membership. I did not change any groups - I only migrated user accounts.

Source: SourceDomain.Com
Trusted: ParentDomain.com
Target: Child.ParentDomain.com

Groups are domain local in ParentDomain.com and contain users from Sourcedomain.com.
User accounts migrated from SourceDomain.com to Child.ParentDomain.com

The groups (in ParentDomain.com) that were broken were groups that contained user accounts from the trusted forest (SourceDomain.com) and those user accounts were migrated to the child domain with SID History enabled.

I could replicate the problem in PowerShell with the Get-ADGroupMember. If the group contained a user account from the trusted forest that I had migrated to the child domain, Get-ADGroupMember fails with "Get-adgroupmember : An unspecified error has occurred

At line:1 char:1

  • Get-adgroupmember -Identity TestGroupSeed
  • ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
  • CategoryInfo : NotSpecified: (TestGroupSeed:ADGroup) [Get-ADGroupMember], ADException
  • FullyQualifiedErrorId : ActiveDirectoryServer:0,Microsoft.ActiveDirectory.Management.Commands.GetADGroupMember"

If I remove the user from the group, Get-ADGroupMember works. Add it back, it fails. This is a domain local group and the user account is the original account from the trusted forest.

Through testing I discovered if I migrate a user without SID History, it does not break Get-ADGroupMember.

My desire is to migrate the users with SID History and not break our existing domain local groups. Any suggestions?

Windows Server Migration
Windows Server Migration
Windows Server: A family of Microsoft server operating systems that support enterprise-level management, data storage, applications, and communications.Migration: The process of making existing applications and data work on a different computer or operating system.
413 questions
{count} votes

2 answers

Sort by: Most helpful
  1. Daisy Zhou 20,791 Reputation points Microsoft Vendor
    2020-08-12T11:01:39.8+00:00

    Hello
    Thank you for posting here.

    Maybe the link blow explains the situation you mentioned, it seems it is by design. But you do not need to perfom the solution.

    Get-ADGroupMember returns error for domain local group to members from remote forests
    https://support.microsoft.com/en-us/help/3171600/get-adgroupmember-returns-error-for-domain-local-group-to-members-from

    And I did two tests in my lab:

    Two forests (Fabrikam.com and a.com) have two-way forest trust.

    Test one
    Fabrikam.com: usertest3
    A.com: group1 (usertest3 is the member in group1)

    I migrate usertest3 with SID history in fabrikam.com to a.com, then I run the command below on DC in domain named a.com, I have the same error as you.

    17215-fi2.png

    But I can logon machine with usertest3 in fabrikam successfully.

    Test two
    Fabrikam.com: u3
    A.com: group1 (u3 is the member in group1)

    I deleted u3 in fabrikam.com. Then run command on DC in domain named a.com:

    17241-fi1.png

    Best Regards,
    Daisy Zhou


  2. Daisy Zhou 20,791 Reputation points Microsoft Vendor
    2020-08-13T06:24:49.5+00:00

    Hello @Jay Griffin ,

    Thank you for your update.

    Sure, I understand that you do not want to remove the users in source domain. Would you please tell us what issue you have except Get-ADGroupMember failure?

    It seems the important (or the only) issue is the migrated users in the new domain can not access the resource in the old domain without SID history.

    For more information, we can refer to the link below.

    Security Considerations for Trusts
    https://video2.skills-academy.com/en-us/previous-versions/windows/it-pro/windows-server-2003/cc755321(v=ws.10)?redirectedfrom=MSDN

    Meanwhile, we can get AD group (the domain local group with users in source domain) in target domain (Child.ParentDomain.com) with command below (the display name of migrated users are SID in source domain instead of friendly display name).

    Get-ADGroup -Identity <group name> -Properties Members -Server<DC name> | Select-Object -ExpandProperty Members | Get-ADObject -Server <DC name>

    For example:

    Get-ADGroup -Identity group1 -Properties Members -Server 2019standard | Select-Object -ExpandProperty Members | Get-ADObject -Server 2019standard
    17307-1213.png

    Best Regards,
    Daisy Zhou

    0 comments No comments