ADMT Migration Guide
ADMT Migration Guide
Abstract
This guide explains how to use the Active Directory Migration Tool version 3.1 (ADMT v3.1) or
ADMT v 3.2 to migrate users, groups, managed service accounts, and computers between
Active Directory domains in different forests (interforest migration) or between Active Directory
domains in the same forest (intraforest migration). It also shows how to use ADMT to perform
security translation between different Active Directory forests.
Information in this document, including URL and other Internet Web site references, is subject to
change without notice. Unless otherwise noted, the example companies, organizations, products,
domain names, e-mail addresses, logos, people, places, and events depicted herein are
fictitious, and no association with any real company, organization, product, domain name, e-mail
address, logo, person, place, or event is intended or should be inferred. Complying with all
applicable copyright laws is the responsibility of the user. Without limiting the rights under
copyright, no part of this document may be reproduced, stored in, or introduced into a retrieval
system, or transmitted in any form or by any means (electronic, mechanical, photocopying,
recording, or otherwise), or for any purpose, without the express written permission of Microsoft
Corporation.
Microsoft may have patents, patent applications, trademarks, copyrights, or other intellectual
property rights covering subject matter in this document. Except as expressly provided in any
written license agreement from Microsoft, the furnishing of this document does not give you any
license to these patents, trademarks, copyrights, or other intellectual property.
2010 Microsoft Corporation. All rights reserved.
Active Directory, Microsoft, Windows, and Windows Server are either registered trademarks or
trademarks of Microsoft Corporation in the United States and/or other countries.
The names of actual companies and products mentioned herein may be the trademarks of their
respective owners.
Contents
ADMT Guide: Migrating and Restructuring Active Directory Domains............................................7
Interforest Active Directory domain restructure............................................................................7
Intraforest Active Directory domain restructure............................................................................8
Terms and definitions................................................................................................................... 9
Active Directory Migration Tool.................................................................................................. 10
Using an include file............................................................................................................... 12
SourceName field............................................................................................................... 12
TargetName field................................................................................................................. 13
TargetRDN, TargetSAM, and TargetUPN fields...................................................................13
Renaming objects............................................................................................................... 14
Using an exclude file........................................................................................................... 14
Using scripts........................................................................................................................... 14
Active Directory Migration Tool versions and supported environments.........................................17
Support for Windows Server features........................................................................................19
Best Practices for Active Directory Migration................................................................................20
Best Practices for Using the Active Directory Migration Tool.........................................................20
Best Practices for Performing User and Group Account Migrations..............................................20
Best Practices for Performing Computer Migrations.....................................................................22
Best Practices for Rolling Back a Migration..................................................................................22
Interforest Active Directory Domain Restructure...........................................................................23
Checklist: Performing an Interforest Migration..............................................................................24
Overview of Restructuring Active Directory Domains Between Forests........................................27
Process for Restructuring Active Directory Domains Between Forests.........................................27
Background Information for Restructuring Active Directory Domains Between Forests................28
Account migration process........................................................................................................ 28
Resource migration process...................................................................................................... 30
Planning to Restructure Active Directory Domains Between Forests............................................30
Determining Your Account Migration Process...............................................................................31
Using SID History to Preserve Resource Access..........................................................................33
Using SID Filtering When Migrating User Accounts......................................................................34
To optimize the arrangement of elements within the logical Active Directory structure
Restructuring involves the migration of resources between Active Directory domains in either the
same forest or in different forests. After you deploy Active Directory or AD DS, you might decide
to further reduce the complexity of your environment by either restructuring domains between
forests or restructuring domains within a single forest.
You can use the Active Directory Migration Tool (ADMT) to perform object migrations and security
translation as necessary so that users can maintain access to network resources during the
migration process. For more information about the different versions of ADMT that are available,
when to use each version, and how to obtain them, see Active Directory Migration Tool versions
and supported environments.
In this guide
Troubleshooting ADMT
Additional Resources
The following sections explain the main migration scenarios for using ADMT. After you determine
the appropriate scenario for your environment, follow the steps later in this guide for that
scenario.
part of the restructuring process, when you migrate objects between forests both the source and
target domain environments exist simultaneously. This makes it possible for you to roll back to the
source environment during the migration, if necessary.
Splitting or cloning forestsfor example, to accommodate divestiture of an organizationis not
supported. For more information, see Restructuring Limitations (http://go.microsoft.com/fwlink/?
LinkId=121736).
Important
If you are using ADMT v3.1, all target domains must be at least at the Microsoft
Windows 2000 native functional level. If you are using ADMT v3.2, all source and target
domains must be at least at the Windows Server 2003 functional level.
10
Migration consideration
Interforest restructure
Intrafo
Object preservation
Objects are cloned rather than migrated. The original object remains in
the source location to maintain access to resources for users.
User
migra
sourc
mana
copie
rema
doma
SID h
group
not m
Password retention
Passw
Local
autom
globa
prese
Closed sets
You m
close
as members of these groups. Built-in account SIDs are identical in every domain. Therefore, builtin accounts cannot be migration objects.
;TargetDomain="target_domain_name"
;TargetOu="target_ou_path"
;PasswordOption=Complex
;PasswordServer=""
;PasswordFile=""
;ConflictOptions=Ignore
;UserPropertiesToExclude=""
;InetOrgPersonPropertiesToExclude=""
;GroupPropertiesToExclude=""
;ComputerPropertiesToExclude=""
[User]
;DisableOption=EnableTarget
;SourceExpiration=None
;MigrateSIDs=Yes
;TranslateRoamingProfile=No
12
;UpdateUserRights=No
;MigrateGroups=No
;UpdatePreviouslyMigratedObjects=No
;FixGroupMembership=Yes
;MigrateServiceAccounts=No
;UpdateGroupRights=No
[Group]
;MigrateSIDs=Yes
;UpdatePreviouslyMigratedObjects=No
;FixGroupMembership=Yes
;UpdateGroupRights=No
;MigrateMembers=No
;DisableOption=EnableTarget
;SourceExpiration=None
;TranslateRoamingProfile=No
;MigrateServiceAccounts=No
[Security]
;TranslationOption=Add
;TranslateFilesAndFolders=No
;TranslateLocalGroups=No
;TranslatePrinters=No
;TranslateRegistry=No
;TranslateShares=No
;TranslateUserProfiles=No
;TranslateUserRights=No
;SidMappingFile="SidMappingFile.txt"
When you run ADMT at the command line, you do not have to include an option in your command
if you want to accept the default value. In this guide, however, tables that list possible parameters
and values are provided for reference. The tables list the command-line equivalent of each option
that is shown in the corresponding ADMT console procedure, including those options for which
you accept the default value.
You can copy the option file reference into Notepad and save it by using a .txt file name
extension.
13
As an example, to migrate a small number of computers, you might type each computer name at
the command line, using the /N option, and then list other migration options within an option file
as follows:
ADMT COMPUTER /N "<computer_name1>" "<computer_name2>" /O:"<option_file>.txt"
Where <computer_name1> and <computer_name2> are the names of computers in the source
domain that you are migrating in this batch.
To specify the names of users, groups, or computers, use one of the following conventions:
The Security Accounts Manager (SAM) account name. To specify a computer name in this format, you
must append a dollar sign ($) to the computer name. For example, to specify a computer with the name
Workstation01, use Workstation01$.
The relative distinguished name (also known as RDN), for example, cn= Workstation01. If you specify
the account as a relative distinguished name, you must specify the source organizational unit (OU).
The canonical name. You can specify the canonical name as DNS DOMAIN
NAME/OU_PATH/OBJECT_NAME or OU_PATH/OBJECT_NAME, for example,
Asia.trccorp.treyresearch.net/Computers/Workstation01 or Computers/Workstation01.
The following sections describe the fields of an include file and provide examples for each field:
SourceName field
The SOURCENAME field specifies the name of the source object. You can specify either an account
name or a relative distinguished name. If you only specify source names, it is optional to define a
header on the first line in the file.
The following example illustrates a header line that specifies the SOURCENAME field. The example
also shows a source object name that is specified in several formats. The second line specifies
an account name. The third line specifies a relative distinguished name.
SourceName
NAME
CN=NAME
14
TargetName field
You can use the TARGETNAME field to specify a base name that is used to generate a target
relative distinguished name, a target SAM account name, and a target user principal name
(UPN). The TARGETNAME field cannot be combined with other target name fields that are
described later in this section.
Note
The target UPN is generated only for user objects, and only a UPN prefix is generated. A
UPN suffix is appended using an algorithm that depends on whether a UPN suffix is
defined for the target OU or the target forest. If the object is a computer, the target SAM
account name includes a "$" suffix.
The following example of input generates the target relative distinguished name, target SAM
account name, and target UPN as "CN=NEWNAME", "NEWNAME," and "NEWNAME" respectively.
SourceName,TargetName
OLDNAME, NEWNAME
CN=NEWNAME
SourceName,TargetRDN,TargetSAM
OLDNAME,
SourceName,TargetRDN,TargetSAM,TargetUPN
OLDNAME,
Note
A comma within the CN value must be preceded with an escape ("\") character or the
operation will fail, and ADMT will record an invalid syntax error in the log file.
SourceName,TargetSAM,TargetUPN,TargetRDN
OLDNAME, NEWSAMNAME, NEWUPNNAME@TARGETDOMAIN,
"CN=NEW NAME"
15
Renaming objects
Use the following format in an include file to rename computer, user, or group objects during
migration:
Use SourceName, TargetRDN, TargetSAM, and TargetUPN as column headings at the top of the
include file. SourceName is the name of the source account, and it must be listed as the first column
heading. The TargetRDN, TargetSAM, and TargetUPN column headings are optional, and you can
list them in any order.
You must specify the account name as user name, relative distinguished name, or canonical name. If
you specify the account name as a relative distinguished name, you must also specify the source OU.
The following are examples of valid include files in which the rename option is used:
SourceName,TargetSAM
abc,def
This include file entry changes the TargetSAM account name for user "abc" to "def." The
TargetRDN and the TargetUPN, which are not specified in this include file, do not change as a
result of the migration.
SourceName,TargetRDN,TargetUPN
abc,CN=def,[email protected]
This include file entry changes the TargetRDN for user abc to CN=def and the TargetUPN to
[email protected]. The TargetSAM for user abc does not change as a result of the migration.
Important
You must specify CN= before using an RDN value.
Then, specify the name of the exclude file when you run the admt command. For example:
admt managedserviceaccount /ef:exclude file name
Optionally, you can exclude specific accounts by using the /en parameter:
admt managedserviceaccount /en:managed service account 1 managed service account 2
Using scripts
The sample scripts that are provided in this guide refer to the symbolic constants that are defined
in a file named AdmtConstants.vbs. The listing that follows shows the ADMT constants Microsoft
16
Visual Basic Scripting Edition (VBScript) file. The constants are also provided in the ADMT
installation folder, in the TemplateScript.vbs file, in the %systemroot%\WINDOWS\ADMT
directory.
To use the sample scripts in the guide, copy the ADMT constants VBScript file into Notepad and
save it as AdmtConstants.vbs. Be sure to save it in the same folder where you plan to save the
sample scripts that are provided in this guide.
Option Explicit
Const admtComplexPassword
= &H0001
Const admtCopyPassword
= &H0002
= &H0010
Const admtIgnoreConflicting
= &H0000
Const admtMergeConflicting
= &H0001
Const admtRemoveExistingUserRights
= &H0010
Const admtRemoveExistingMembers
= &H0020
Const admtMoveMergedAccounts
= &H0040
Const admtLeaveSource
= &H0000
Const admtDisableSource
= &H0001
= &H0010
17
Const admtEnableTarget
= &H0020
Const admtNoExpiration = -1
Const admtTranslateReplace = 0
Const admtTranslateAdd
= 1
Const admtTranslateRemove
= 2
Const admtReportMigratedAccounts
= 0
Const admtReportMigratedComputers = 1
Const admtReportExpiredComputers
= 2
Const admtReportAccountReferences = 3
Const admtReportNameConflicts
= 4
Const admtNone
= 0
Const admtData
= 1
Const admtFile
= 2
Const admtDomain
= 3
Const admtRecurse
= &H0100
Const admtFlattenHierarchy
= &H0000
18
Installation platform
Windows
Server 2008 R2
19
In addition, ADMT v3.2 provides the following support for new Active Directory features in
Windows Server 2008 R2.
Feature
No impact
No impact
Windows PowerShell
20
Perform regular backups of domain controllers in both the source and target domains throughout the
course of the migrations. If you are migrating computers that contain file shares to perform security
translation, we recommend that you also back up those computers throughout migrations.
Before you begin a migration, perform a test migration by creating a test user, adding the test user to
the appropriate global groups, and then verifying resource access before and after migration.
Test your migration scenarios in a test environment before migrating objects in the production
environment.
Have a recovery plan, and ensure that your recovery plan works during the test phase of your
migration.
Decrypt files that have been encrypted by means of Encrypting File System (EFS). Failure to decrypt
encrypted files will result in loss of access to encrypted files after migration. Be sure to communicate
to end users that they must decrypt any encrypted files or they will lose access to those files.
Ensure that the system time is synchronized in each domain from which objects are migrated. Kerberos
authentication fails if time is skewed.
Perform regular backups of domain controllers in both the source and target domains throughout the
course of the migrations. If you are migrating computers that contain file shares to perform security
translation, we recommend that you also back up those computers throughout migrations.
We recommend that you migrate users in batches. A batch size of 100 users helps to keep the migration
process manageable.
Always administer changes to user accounts and group accounts in the source domain during the
migration process.
21
Use the Migrate and merge conflicting objects option on the Conflict Management page of the
User Account Migration Wizard and the Group Account Migration Wizard to remigrate users and
groups as often as necessary throughout the migration. Administering changes in the source domain
and then using the Migrate and merge conflicting objects option during migration ensures that all
changes that are made to an object in the source domain are reflected after it has been migrated to the
target domain.
To maintain access to resources, ensure that group membership adheres to the following guidelines:
Place global groups into local groups to grant members of the global groups access to a resource.
Adhere to the guidelines in the following table when you translate user profiles.
Profile type
Translation guidelines
Roaming profiles
Local profiles
Unmanaged profiles
Important
It is important to verify that local profile translation has succeeded before users attempt to
log on to the target domain. If users log on to the target domain by using their new target
accounts and their profiles have not translated successfully, those users must be
migrated again from the source domain to the target domain. For more information about
the steps to follow if local profile translation fails, see Troubleshooting Security
Translation Issues.
22
Perform regular backups of domain controllers in both the source and target domains throughout the
course of the migrations. If you are migrating computers that contain file shares to perform security
translation, we recommend that you also back up those computers throughout the migration.
Verify that workstations and member servers have restarted immediately after you join them to the
target domain. The Active Directory Migration Tool (ADMT) automates the restart of workstations and
member servers, but you use the Minutes before computers restart after wizard completion option
in the Computer Migration Wizard to select the amount of time that passes before the computer is
restarted. Computers that do not restart after migration are in an indeterminate state.
Communicate to end users that their computers must be connected to the network at the time that their
computer is scheduled to be migrated.
Roll back user and group accounts that have been migrated between forests by enabling the accounts in
the source domain (if they were disabled during the migration), verifying that the accounts have access
to resources in the source domain, and then verifying that logon scripts and user profiles work as
configured in the source domain.
Roll back resources that have been migrated between forests by changing the domain membership of
servers and workstations and then restarting them. Log on to the resources in the source domain to
ensure that the resources are accessible.
Roll back accounts and resources that have been migrated within a forest by migrating the objects back
from the target domain to the source domain. Accounts and resources that are migrated within a forest
are moved and not copied. Therefore, they do not continue to exist in the source domain.
Note
To ensure a successful rollback of an intraforest migration, do not attempt to delete
the objects in the target domain and then restore them in the source domain. You will
not be able to recover the objects in the source domain because they are
automatically deleted by the cross-domain move proxy if a restore is attempted.
Note
23
When you perform an intraforest migration using ADMT v3.1, if the functional level of
the source domain is Windows 2000 mixed, you will not be able to migrate the
objects back from the target domain to the source domain to undo migration
changes. A remigration requires that the source domain become the target domain,
and, with ADMT v3.1, the functional level of the target domain must be at least at
Windows 2000 native.
Merge users and resources with another organization because of a corporate merger and the need to
consolidate the two information technology (IT) infrastructures.
Relocate users and resources on a regular basis because of a planned multiforest deployment.
Remove objects from your forest because of a divestiture to another organization or to merge later into
a new or existing forest for that organization.
In this section
Restructuring Limitations
Migrating Accounts
Migrating Resources
24
To merge your Active Directory forest with the forest of another organization and consolidate the two
information technology (IT) infrastructures
Task
Reference
Note
This registry key does not need to be set to
migrate computers that run Windows
Server 2008 R2, Windows 7, or
Windows Vista SP1.
Registry path:
HKLM\System\CurrentControlSet\Services\Netlogon
\Parameters
Registry value: AllowNT4Crypto
Type: REG_DWORD
Data: 1
Note
This registry setting corresponds to the Allow
cryptography algorithms compatible with
Windows NT 4.0 setting in Group Policy.
For any migration tasks that use agent deployment and
Task
Reference
Task
Reference
27
28
29
When user accounts are migrated between Active Directory domains in different forests, the
original account remains in place in the source domain and a new account is created in the target
domain. Because the security identifier (SID) of a security principal (user or group) always
contains an identifier for the domain in which the security principal is located, a new SID is
created for the user in the target domain. Because ADMT can migrate the SID of the original
security principal to the security principal in the target domain, you do not have to perform
additional tasks to ensure resource access unless you are using SID filtering between the forests.
If you are using ADMT v3.1 and Microsoft Exchange Server version 5.5, use the ADMT Exchange
Server Migration Wizard to translate security on the mailboxes for migrated users. If you are
using Exchange 2000 servers, ADMT does not provide tools for mailbox migration. In this case,
plan to migrate mailboxes first by using the Exchange 2000 mailbox migration tool and then
migrate user accounts.
If you are using Group Policy to manage folder redirection or software distribution, ensure that
these policies continue to apply when you migrate user accounts to a new forest. Also, if you are
using a Group Policy object (GPO) to grant or deny remote access in the source domain and not
the target domain, ADMT cannot determine which remote access to assign to the user.
If you are using Group Policy to manage folder redirection, Offline Files does not work after the
user account is migrated to a new forest. Offline Files stores the SID of the user as owner; the
SID changes when the user account is migrated. To restore ownership of Offline Files, use the
ADMT Security Translation Wizard to replace the permissions on the files and folders on the
client computer that contains the offline files cache.
To ensure that users continue to have access to Offline Files after you migrate user accounts to
the target domain, you can do the following:
1.
2.
If the SID history of the user account was not migrated to the target domain, translate security on the
server that hosts redirected folders.
If the folder redirection path is different in the new environment, users can access the folder if the SID
history of the user account was migrated to the target domain. The folder redirection extension copies
the files from the original location in the source domain to the new location in the target domain. SID
history enables the user account to access the source folders.
If the folder redirection path is the same in the new environment, users cannot access the redirected
folder because folder redirection will check ownership of the redirected folder and fail. You must then
translate security on the redirected folder on the server.
If you are using Group Policy to manage software installation and the Windows Installer package
requires access to the original source for operations such as repair and remove, you must
translate security on the software distribution point after you migrate users to ensure that software
installation continues to function properly in the target domain.
30
Workstation accounts
The migration of workstations and member servers is a straightforward process. The local groups
that you create to assign permissions to users are located in the local Security Accounts Manager
(SAM) database, and they are moved when you move the server. You do not have to reconfigure
access control lists (ACLs) so that users can access resources after the migration.
To migrate domain controllers between domains, remove Active Directory Domain Services
(AD DS) from the domain controller, migrate it as a member server to the target domain, and then
reinstall AD DS.
To prepare for the restructuring process, the Active Directory deployment team must obtain the
necessary design information from the Active Directory design team.
The following illustration shows the steps involved in planning to restructure Active Directory
domains between forests.
31
Migrate user accounts while using SID history for resource access. With this method, you remove SID
filtering on the trusts between the domains to enable users to access resources in the source domain by
means of their SID history credentials.
If you have a forest trust in place, you remove SID filtering on the forest trust. (You can also
override the forest trust by creating an external trust so that the domain that holds the resources
trusts the target domain and then removing SID filtering on the external trust.)
If you do not have a forest trust in place, you establish external trusts between the source and
target domains. You then have to remove SID filtering on the external trusts if the domain
controller that is used to create the trust is running Windows Server 2008 R2, Windows
Server 2008, or Windows Server 2003. If you are using ADMT v3.1, the domain controller that is
32
used to create the trust can be running Windows 2000 Service Pack 4 (SP4) or later.
For more information about this process, see Migrating Accounts While Using SID History,
later in this guide.
Migrate all users, groups, and resources to the target domain in one step. For more information about
this process, see Migrating Accounts While Using SID History, later in this guide.
Migrate user accounts without using SID history for resource access, but translate security for all
resources before the migration process to ensure resource access. For more information about
migrating accounts without using SID history, see Migrating Accounts Without Using SID History,
later in this guide.
To determine which account migration process is best for your organization, you must first
determine if you can disable SID filtering and migrate accounts while using SID history for
resource access. You can safely do this if the administrators of the source domain fully trust the
administrators of the target domain. You might disable SID filtering if one of the following
conditions applies:
The administrators of the trusting domain are the administrators of the trusted domain.
The administrators of the trusting domain trust the administrators of the trusted domain and are
confident that they have secured the domain appropriately.
If you disable SID filtering, you remove the security boundary between forests, which otherwise
provides data and service isolation between the forests. For example, an administrator in the
target domain who has service administrator rights or an individual who has physical access to a
domain controller can modify the SID history of an account to include the SID of a domain
administrator in the source domain. When the user account for which the SID history has been
modified logs on to the target domain, it presents valid domain administrator credentials for, and
can obtain access to, resources in the source domain.
For this reason, if you do not trust the administrators in the target domain or do not believe that
the domain controllers in the target domain are physically secure, enable SID filtering between
your source and target domains, and migrate user accounts without using SID history for
resource access.
The following illustration shows the decision process involved in determining which migration
process is appropriate for your organization.
33
Resources within the source and target domains resolve their access control lists (ACLs) to SIDs
and then check for matches between their ACLs and the access token when granting or denying
access. If the SID or the SID history matches, access to the resource is granted or denied,
according to the access specified in the ACL. If the resource is in the source domain and you
have not run security translation, it uses the SID history of the user account to grant access.
You can also preserve the original SID for global groups and universal groups in the SID history
of the global group or universal group in the target domain. Because local group memberships
are based on SIDs, when you migrate the SID to the SID history of the global group or universal
group in the target domain, the local group memberships of the global group or universal group
are preserved automatically.
SID history is used for the following:
Resource access
If you are not using SID history for resource access, you still have to migrate SID history to
facilitate access to those items.
For more information about SID-history-based attacks and SID filtering, see Configuring SID
Filtering Settings (http://go.microsoft.com/fwlink/?LinkId=73446).
36
To create a resource object assignment table, identify the source and target OU for each object
and note the physical location and role in the target domain. For a worksheet to assist you in
creating a resource object assignment table, see "Resource Object Assignment Table"
(DSSREER_2.doc) in the Job_Aids_Designing_and_Deploying_Directory_and_Security_Services
download of the Job Aids for Windows Server 2003 Deployment Kit
(http://go.microsoft.com/fwlink?LinkId=14384).
The following illustration shows an example of a resource object assignment table.
user credentials. Testing also helps ensure that users are able to access the resources that you
migrate.
After your testing is complete, you can proceed with migrating small pilot groups and then
gradually increase the size of each batch of migration objects in your production environment.
Use the following process to test the migration of your account object and resource objects:
1.
Create a test user in the source domain. Include this test user with your migrations.
2.
Join that user to the appropriate global groups to enable resource access.
3.
Log on to the source domain as the test user, and verify that you can access resources as appropriate.
4.
After you migrate the user account, translate the user profile, and migrate the workstation of the user,
log on to the target domain as the test user, and verify that the user has retained all necessary access
and functionality. For example, you might test to verify that:
The user has access to all appropriate resources, such as file and print shares; access to services
such as messaging; and access to line-of-business (LOB) applications. It is especially important to
test access to internally developed applications that access database servers.
The user profile was successfully translated, and the user retains desktop settings, desktop
appearance, shortcuts, and access to the My Documents folder. Also, verify that applications
appear in and start from the Start menu.
You cannot migrate every user property when you migrate user accounts. For more
information about user properties that cannot be migrated, see Migrate User Accounts,
later in this guide.
After you migrate resources, log on as the test user in the target domain, and verify that you can
access resources as appropriate.
If any steps in the test process fail, identify the source of the problem, and determine whether you
can correct the problem before the object has to be accessible in the target domain. If you cannot
correct the problem before access to the object is required, roll back to your original configuration
to ensure access to the user or resource object. For more information about creating a rollback
plan, see Creating a Rollback Plan, later in this guide.
As part of your test plan, create a migration test matrix. Complete a test matrix for each step that
you complete in the migration process. For example, if you migrate 10 batches of users, complete
the test matrix 10 times, once for each batch that you migrate. If you migrate 10 member servers,
complete the test matrix for each of the 10 servers.
For a worksheet to assist you in creating a test matrix, see Migration Test Matrix
(DSSREER_3.doc) in the Job_Aids_Designing_and_Deploying_Directory_and_Security_Services
download of the Job Aids for Windows Server 2003 Deployment Kit
(http://go.microsoft.com/fwlink?LinkId=14384).
The following illustration shows an example of a completed migration test matrix.
38
User migration was successful, but user workstation migration or local profile translation failed.
If user impact or downtime reaches a level that you have defined as unacceptable in your
organization, you can implement your rollback plan and continue to operate in your premigration
environment. Because the source domain remains intact during the restructure, you can restore
the original environment by completing a few key steps.
To roll back to the premigration environment after migrating account objects:
1.
Enable the user accounts in the source domain (if you disabled the accounts during the migration
process).
2.
3.
4.
5.
Verify that the logon scripts and user profiles for users work as configured in the source domain.
The rollback process for resource objects is similar to that for account objects. To roll back to the
premigration environment after migrating resource objects:
1.
Change the domain membership for the server or workstation to the source domain.
2.
3.
Log on as a user and verify that you can access the resource.
Note
If you have to modify objects, such as member servers or domain controllers, to
migrate them to the target domain, back up all the data before you make the
modifications and perform the migration.
Plan for the administration and management of the following types of account migration objects:
User profiles
If you change an attribute in the target domain and it is not used in the source domain, it is not
overwritten with the NULL value from the source domain.
If you change an attribute in the target domain and it is used in the source domain, it is overwritten
with the value from the source domain.
If the user has group memberships, the memberships are merged from the source memberships and the
target memberships.
If this is not the desired behavior, you can configure ADMT to exclude attributes from being
migrated, so that attributes in the target domain are retained.
For example, suppose that after migrating a user, you set attributes on the new user object in the
target domain, such as a telephone number or office number. You remigrate the user by using the
Migrate and merge conflicting objects option in ADMT, and the new information is retained in
the target domain. If you changed the group memberships for the user in the source domain, the
changes are propagated to the target domain when you perform the remigration.
Some attributes are excluded from the migration. These attributes include the following:
41
SIDs (Although SIDs can be added to the SID history of the object in the target domain.)
LegacyExchangeDN
Profile translation is one type of security translation, and profiles are translated during the
migration process. If you perform security translation in add mode, the SIDs in the target and the
source domains both have access to the profile. Therefore, if you have to roll back to the source
environment, the SID in the source domain can use the profile. If you perform security translation
in replace mode, you must retranslate the profile by using a SID mapping file (undoing the
security translation) to roll back to the source environment.
Important
If you have to roll back to your original configuration, notify users that profile changes
made in the target domain are not reflected in the source domain.
Some organizations might choose not to migrate user profiles. Other organizations might choose
to replace users workstations during the user account migration process, and use a tool such as
the User State Migration Tool (USMT) to migrate user data and settings to the users' new
computers. The following table summarizes the migration requirements for user profiles.
Type
Description
Migration Requireme
Roaming profiles
Hardware refresh
Migrate as a separa
account migration. M
users new compute
USMT.
43
USER_NAME
Owner = USER_NAME
- Full Control
Therefore, only the owner of the profile, and the local system on which the share resides, are able
to access the <profilename> or <profilename>.V2 folder. When the folder is assigned those
default permissions, ADMT cannot access the folder for security translation.
To configure the folder permissions in order to allow ADMT v3.2 to migrate the roaming profile,
you can enable a Group Policy setting for the domain. In Windows Server 2008 R2, the setting is:
Computer Configuration\Policies\Administrative Templates\System\User Profiles\Add the
Administrators security group to the roaming user profiles
If this setting enabled and propagated before the first logon of the user (before the roaming profile
is created), then the roaming profile directory will have an added permission that grants Full
44
Control to members of the Administrators group of the share host (host.name.fqdn in this
example).
After this setting is enabled, migrations can be performed as long as the user who runs ADMT
v3.2 is included in the Administrators group of the share.
The user who runs ADMT user needs Full Control access on the roaming profile folders. To
achieve that, you can try one of the following options:
1.
2.
3.
Create a script (for example, using Windows PowerShell) that performs that following:
a.
b.
Adds the Administrators security group to the ACL set of the profile folders propagating to all
subfolders and files
c.
Adds the Administrators security group with Full Control to the ACL set of the profile folders and
have the permission inherited to all subfolders and files.
Create a script (for example, using Windows PowerShell) that performs that following:
a.
Runs in the context of each roaming user (for example, as a logon task).
b.
Adds the Administrators security group with Full Control to the ACL set of the profile folders and
have the permission inherited to all subfolders and files.
General information
Alert users to the fact that their user accounts are scheduled to be migrated to a new domain.
Point users to a Web page or internal resource where they can find additional information and
view a migration schedule.
45
Inform users of their new domain name. Be sure to let them know that their account passwords
will not change. Let users know that the original domain account will be disabled immediately
following the migration and the disabled account will be deleted after a specified period of time.
This is not necessary if the users log on with user principal names (UPNs).
Impact
Make sure that users understand that when their account is migrated, they might be unable to
access some resources, such as Web sites, shared folders, or resources that individuals in their
group or division do not widely use.
Provide information to users about whom to contact for assistance in regaining access to required
resources.
Premigration steps
Alert users to any steps that they must complete before the migration process begins. For
example, they must decrypt files encrypted by means of Encrypting File System (EFS). Failure to
decrypt encrypted files will result in loss of access to encrypted files following the migration.
Users must also ensure that their computers are connected to the network when their account is
scheduled to be migrated.
Expected changes
Describe other changes that users can expect to experience after the migration, such as changes
in use of smart cards, secure e-mail, or instant messaging, if applicable.
Before you begin to migrate your accounts from the source domain to the target domain, you
have to prepare the source and target domains for the migration. The following illustration shows
the tasks that are required to prepare the domains for the interforest domain restructure process.
47
Create a one-way trust between the source domain and the target domain.
For more information about creating trusts, see Creating Domain and Forest Trusts
(http://go.microsoft.com/fwlink/?LinkId=77381).
computer organizational units (OUs) in the target domain, with the extended right to migrate SID
history on the user OU. The user must be a local administrator on the computer in the target
domain on which ADMT is installed. A migration account that you use to migrate workstations and
domain controllers must have local administrator or source domain administrator credentials on
the workstations or the account must have source domain administrator credentials on the
domain controller, or both.
In the target domain, it is necessary to use an account that has delegated permissions on the
computer OU and the user OU. You might want to use a separate account for the migration of
workstations if this migration process is delegated to administrators that are in the same location
as the workstations.
The following table lists the credentials that are required in the source and target domains for
different migration objects.
Migration object
Credentials necessary in
Delegated permission o
OU, extended permissi
local administrator on th
is installed
Computer
Delegated permission o
administrator on the co
installed
Note
Delegated permission o
administrator on the co
installed.
Note
Migration object
Credentials necessary in
information, see Pr
roaming profiles wi
Windows Vista and
The following procedures provide examples for creating groups or accounts to migrate accounts
and resources. Procedures differ according to whether a one-way trust or a two-way trust exists
The procedure for creating migration groups when a one-way trust exists is more complex than
the procedure for when a two-way trust exists. This is because, with a one-way trust, you must
add the migration group to the local Administrators group on local workstations.
The sample procedure for creating migration groups when a one-way trust exists involves
creating separate groups for migrating accounts and resources. However, you can combine
ACCT_MIGRATORS and RES_MIGRATORS into one group, if you do not need to separate them to
delegate different sets of permissions.
To create an account migration group when a one-way trust exists in which the source
1.
2.
In the target domain, add the ACCT_MIGRATORS group to the Domain Admins group, or delegate
administration of OUs that are targets for account migration to this group.
3.
If you are migrating SID history, and you did not place the ACCT_MIGRATORS group in the Domain Admins
group, grant the ACCT_MIGRATORS group the Migrate SID History extended permission on the target
domain object. To do this, follow these steps:
a.
Start Active Directory Users and Computers, right-click the domain object, and then click
Properties.
b.
Click the Security tab, click Add, and then select ACCT_MIGRATORS.
If the Security tab does not appear, in Active Directory Users and Computers, click View,
and then click Advanced Features.
c.
In Permissions for acct_migrators, click Allow for the Migrate SID History permission.
4.
In the source domain, add the ACCT_MIGRATORS group to the Builtin\Administrators group.
5.
On each computer on which you plan to translate local profiles, add the ACCT_MIGRATORS group to the
local Administrators group.
To create a resource migration group when a one-way trust exists in which the source
1.
2.
In the target domain, add the RES_MIGRATORS group to the Domain Admins group, or delegate
administration of OUs that are targets for resource migration to this group.
3.
In the source domain, add the RES_MIGRATORS group to the Administrators group.
4.
On each computer that you plan to migrate or on which you plan to perform security translation, add the
RES_MIGRATORS group to the local Administrators group.
To create a resource migration account when a two-way trust exists between the source
1.
2.
In the source domain, add the RES_MIGRATOR account to the Domain Admins group. (The Domain Admins
group is a member of the local Administrators group on every computer in the domain by default.
Therefore, you do not have to add it to the local Administrators group on every computer.)
3.
In the target domain, delegate permissions on OUs that are targets for resource migration to the
RES_MIGRATOR account.
ADMT also includes database administration roles that you can use to assign a subset of
database permissions to users who perform specific migration tasks. The database administration
roles and the migration tasks that they can perform are listed in the following table.
Role
Migration task
Account migrators
Resource migrators
Data readers
Users who are assigned the role of SQL Server sysadmin hold all ADMT database administration
roles. They have the credentials to do the following:
51
By default, the local Administrators group is assigned the role of sysadmin and can perform all
ADMT database functions.
Enable TCP/IP client support on the source domain primary domain controller (PDC) emulator.
Note
If you are migrating from a domain with domain controllers that run
Windows Server 2003 or later to another domain with domain controllers that run
Windows Server 2003 or later, the TcpipClientSupport registry entry does not have
to be modified.
Enable auditing of account management in the source and target domains. For Windows
Server 2008 R2 and Windows Server 2008, you need to also enable auditing for directory service
access in order to migrate users with SID history between forests.
To create a local group in the source domain to support auditing
In the source domain, create a local group called SOURCEDOMAIN$$$, where SOURCEDOMAIN is the
NetBIOS name of your source domain, for example, Boston$$$. Do not add members to this group; if
you do, SID history migration will fail.
To enable TCP/IP client support on the source domain PDC emulator
1.
On the domain controller in the source domain that holds the PDC emulator operations master (also
known as flexible single master operations or FSMO) role, click Start, and then click Run.
2.
changes to the registry, you should back up any valued data on the computer. You can
also use the Last Known Good Configuration startup option if you encounter
problems after you make changes.
3.
4.
Modify the registry entry TcpipClientSupport, of data type REG_DWORD, by setting the value to 1.
5.
1.
2.
Click Start, point to All Programs, point to Administrative Tools, and then click Group Policy
Management.
3.
4.
5.
In Group Policy Management Editor, in the console tree, navigate to the following node:
Computer Configuration | Policies | Windows Settings | Security Settings | Local Policies | Audit
Policy
6.
In the details pane, right-click Audit account management, and then click Properties.
7.
Click Define these policy settings, and then click Success and Failure.
8.
9.
In the details pane, right-click Audit directory service access and then click Properties.
10. Click Define these policy settings and then click Success.
11. Click Apply, and then click OK.
12. If the changes need to be immediately reflected on the domain controller, open an elevated command
prompt and type gpupdate /force.
13. Repeat steps 1 through 12 in the SOURCE domain.
53
2.
Start Active Directory Users and Computers, and then create the OU structure that your design team
specified.
3.
4.
Delegate the administration of the OU structure to groups as defined by your design team.
Detach an existing database file from a previous version of ADMT and SQL Server
Remove all previous versions of ADMT by using Add or Remove Programs from Control Panel. If
you attempt to install ADMT v3.1 on a server that has a previous version of ADMT installed, you
receive an error, and the installation does not proceed. If necessary, you can import the database from
the previous version of ADMT (such as ADMT v2.0 or ADMT v3.0) into ADMT v3.1 during the
installation.
If you do not plan to use the default local database installation, ensure that another SQL Server 2000 or
SQL Server 2005 database installation is configured with an ADMT instance. For more information
about creating an ADMT instance on a SQL Server database, see Installing ADMT Using a
Preconfigured SQL Database.
55
Wizard Page
Action
Click Next.
Configuring Components
Database Selection
Wizard Page
Action
Summary
57
In Control Panel, use Add or Remove Programs to remove all versions of ADMT earlier than
ADMT v3.2.
Although ADMT v3.2 does not support an upgrade from a previous version of ADMT, you can
reuse an existing database from a previous ADMT installation, unless it is a database from
ADMT v2 or ADMT v1. For more information, see Reuse an existing ADMT database from
a previous installation.
Install or upgrade a server computer (preferably a member server) in either your source or target
domain environment as necessary to run Windows Server 2008 R2.
Although you can use ADMT v3.2 to migrate accounts and resources from Active Directory
environments that have a domain functional level of Windows Server 2003 or later, you can
install ADMT v3.2 only on a server running Windows Server 2008 R2.
In addition to running Windows Server 2008 R2, the server computer that you use to install
ADMT v3.2 must not be installed under the Server Core installation option or be running as a
read-only domain controller (RODC).
Configure a SQL Server database installation with an ADMT instance. You can either download and
install SQL Server Express locally or create a database instance for ADMT from an existing
SQL Server database.
For more information about installing SQL Server Express, see Install ADMT v3.2. For more
information about creating an ADMT instance on an existing SQL Server database, see
Install ADMT by Reconfiguring a Database Installation with Admtdb.exe.
2.
On the Welcome page, ensure that the recommendations are completed, and then click Next.
58
3.
On the License Agreement page, click I Agree, and then click Next.
4.
5.
If you chose a SQL Express installation and a database file ADMT.mdf is not in the default data location
%windir%\ADMT\Data, the Database Import page appears. Otherwise, ADMT Setup automatically
attaches to that database file, and the Summary page appears.
On the Database Import page, if you do not need to import data, click No, do not import data
from an existing database (Default). If you need to import data from a previous ADMT
installation, click Yes, import data from an existing ADMT v3.0 or ADMT v3.1 database, and
then, to navigate to the existing database file location, click Browse.
Before you can import the data from an existing database, you have to detach the database file
from SQL Server by using SQL Server commands. For more information, see Detach an
existing database file from a previous version of ADMT and SQL Server.
When you are finished, click Next.
6.
On the Summary page, review the results of the installation, and then click Finish.
For more information about this stored procedure call, see SQL Server documentation. For more
information about how to use SQL Server Management Studio to detach the database, see How
to: Detach a Database (SQL Server Management Studio (http://go.microsoft.com/fwlink/?
LinkId=183994).
59
Description
To see Help for all Admtdb.exe command-line options, at the command prompt, type admtdb /?.
60
If you began the migration by using a local SQL Server Express database and then configured a
remote instance of a SQL Server database, and you need to switch back to using a local
SQL Server Express database, complete the following procedure. In this case, the ADMT
database file is already attached to the SQL Express instance. Therefore, there is no need to
explicitly reattach it.
If you began the migration by using SQL Server and you want to switch to SQL Server Express,
see Reuse an existing ADMT database from a previous installation.
Membership in Administrators, or equivalent, is the minimum required to complete this
procedure. Review details about using the appropriate accounts and group memberships at Local
and Domain Default Groups (http://go.microsoft.com/fwlink/?LinkId=83477).
To reuse a local database after you configure a remote instance of a SQL Server
1.
2.
database
On the local computer, click Start, point to Administrative Tools, and then click Services.
In the Details pane, ensure that the service hosting the SQL Server Express instance is running and that
the Startup Type is set to Automatic. If you are using ADMT v3.1 and you had ADMT setup install
SQL Server Express, the service name is MSSQL$MS_ADMT.
If the service is not started or if it is not set to start automatically at system startup, click
Started, right-click the name of the service, and then click Properties.
3.
4.
5.
Close Services.
6.
Note
Membership in Administrators, or equivalent, is the minimum required to complete this
procedure. Review details about using the appropriate accounts and group memberships
at Local and Domain Default Groups (http://go.microsoft.com/fwlink/?LinkId=83477).
To use an existing (detached) ADMT database with a local SQL Server instance
1.
On the local computer, click Start, point to Administrative Tools, and then click Services.
2.
In the details pane, ensure that the service hosting the SQL Server Express instance is running and that
the Startup Type is set to Automatic. If you are using ADMT v3.1 and you had ADMT setup install
SQL Server Express, the service name is MSSQL$MS_ADMT.
If the service is not started or if it is not set to start automatically at system startup, click
Started, right-click the name of the service, and then click Properties.
3.
4.
5.
Close Services.
6.
You can now use the existing ADMT database with the local SQL Server instance. It is not
necessary to run the ADMT installation wizard again. ADMT installation can be run only once.
You can perform any subsequent database configuration changes by using the admtdb.exe and
admt config setdatabase commands.
PES service can be installed on any writable domain controller in the source domain that
supports 128-bit encryption.
Note
The PES service cannot be installed on read-only domain controllers (RODCs).
Because ADMT does not check all settings of the target domain password policy, users need to
explicitly set their password after migration unless the Password never expires or Smartcard is
required for interactive logon flags are set.
The PES service installation in the source domain requires an encryption key. However, you must
create the encryption key on the computer running the ADMT in the target domain. When you
create the key, save it to a shared folder on your network or onto removable media so that you
can copy it to the local drive of the source domain controller where the PES service is installed.
Store it in a secure location that you can reformat after the migration is complete.
You can install the PES service after you install ADMT. The following procedures explain how to
install and use the PES service on computers running Windows Server 2008 R2 or Windows
Server 2008.
Membership in Administrators, or equivalent, is the minimum required to complete this
procedure. Review details about using the appropriate accounts and group memberships at Local
and Domain Default Groups (http://go.microsoft.com/fwlink/?LinkId=83477).
To create an encryption key
At a command line, type the following command, and then press ENTER:
admt key /option:create /sourcedomain:<SourceDomain> /keyfile:<KeyFilePath>
/keypassword:{<password>|*}
Value
Description
<SourceDomain>
<KeyFilePath>
{<password>|*}
After you create the encryption key, configure the PES service on a domain controller in the
source domain.
ADMT provides the option to run the PES service under the Local System account or by using the
credentials of an authenticated user in the target domain. We recommend that you run the PES
service as an authenticated user in the target domain. This way, you do not have to add the
Everyone group and the Anonymous Logon group to the PreWindows 2000 Compatible Access
group.
Note
If you run the PES service under the Local System account, ensure that the Pre
Windows 2000 Compatible Access group in the target domain contains the Everyone
group and the Anonymous Logon group.
To configure the PES service in the source domain
1.
On the domain controller that runs the PES service in the source domain, insert the encryption key disk.
2.
Run Pwdmig.msi. If you set a password during the key generation process on the domain controller in the
target domain, provide the password that was given when the key was created, and then click Next.
64
Wizard page
Action
Click Next.
Encryption File
To install the ADMT Password Migration dynamiclink library (DLL), you must specify a file that
contains a valid password encryption key for this
source domain. The key file must be located on a
local drive.
You use the admt key command to generate the
key files. For more information, see the previous
procedure "To create an encryption key."
Summary
3.
4.
After the domain controller restarts, to start the PES service, point to Start, point to All Programs, point
to Administrative Tools, and then click Services.
5.
In the details pane, right-click Password Export Server Service, and then click Start.
Note
Run the PES service only when you migrate passwords. Stop the PES service after you
complete the password migration.
65
Creates a local group, SOURCE_DOMAIN$$$, in the source domain, which is used to audit SID history
operations. Do not add members to this group; if you do, SID history migration will fail.
If the source domain is Windows 2000 and you are using ADMT 3.1, TCP/IP client support on the
source domain primary domain controller (PDC) is enabled by setting the value of the registry entry
TcpipClientSupport to 1. This entry is located in the following subkey:
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Lsa
Setting TcpipClientSupport to 1 enables remote procedure calls (RPCs) over the TCP
transport, while preserving the security of the system.
This is not required for domains with domain controllers that run Windows Server 2003 or
later.
In the ADMT console, use the Group Account Migration Wizard by completing the steps in the following
table. Accept default settings when no information is specified.
66
Wizard page
Action
Domain Selection
Group Selection
Group Options
2.
User Account
Conflict Management
When the wizard has finished running, click View Log, and then review the migration log for any errors.
67
When the accounts that the Service Account Migration Wizard identifies in the ADMT database as
running in the context of a user account are migrated to the target domain, ADMT grants each
account the right to log on as a service. If the service account is assigned rights by means of its
membership in a group, the Security Translation Wizard updates the account to assign those
rights. For more information about running the Security Translation Wizard, see Transitioning
Service Accounts in Your Migration later in this guide.
You can identify service accounts by using the ADMT snap-in, the ADMT command-line option, or
a script.
To identify service accounts by using the ADMT snap-in
1.
On the computer in the target domain on which ADMT is installed, log on by using the ADMT account
migration account.
2.
In the ADMT snap-in, click Action, and then click Service Account Migration Wizard.
3.
Complete the Service Account Migration Wizard by using the information in the following table.
69
Wizard page
Action
Domain Selection
Update Information
Agent Dialog
The wizard connects to the selected computers and then sends an agent to check every service
on the remote computers. The Service Account Information page lists the services that are
running in the context of a user account and the name of that user account. ADMT notes in its
database that these user accounts have to be migrated as service accounts. If you do not want a
user account to be migrated as a service account, select the account, and then click
Skip/Include to change the status from Include to Skip.
70
You use Update SCM to update the Service Control Manager with the new information. Unless
you have a failure in reaching a computer to update the service, the Update SCM button is not
available. If you have a problem updating a service account after the account was identified and
migrated, ensure that the computer that you are trying to reach is available, and then restart the
Service Account Migration Wizard.
In the wizard, click Update SCM to try to update the service. If you ran the Service Account
Migration Wizard previously and the Update SCM button is not available, examine the ADMT log
files to determine the cause of the problem. After you correct the problem and the agent can
connect successfully, the Update SCM button becomes available.
To identify service accounts by using the ADMT command-line option
1.
On the computer in the target domain on which ADMT is installed, log on by using the ADMT account
migration account.
2.
At the command line, type the following command, and then press ENTER:
ADMT SERVICE /N "<computer_name1>" "<computer_name2>" /SD:" <source_domain>" /TD:"
<target_domain>"
Where <computer_name1> and <computer_name2> are the names of computers in the source
domain that run service accounts.
As an alternative, you can include parameters in an option file that is specified at the command
line as follows:
ADMT SERVICE /N "<computer_name1>" "<computer_name2>" /O:" <option_file>.txt"
The following table lists the common parameters that are used for the identification of service
accounts, along with the command-line parameter and option file equivalents.
3.
Values
Command-line syntax
<Source domain>
/SD:"SOURCE_DOMAIN"
SourceDomain=
<Target domain>
/TD:"TARGET_DOMAIN"
TargetDomain=
Review the results that are displayed on the screen for any errors.
To identify service accounts by using a script
Create a script that incorporates ADMT commands and options for identifying service accounts by using
the following sample script. Copy the script to Notepad, and save the file with a .wsf file name extension
in the same folder as the AdmtConstants.vbs file.
<Job id="IdentifyingServiceAccounts" >
<Script language="VBScript"
src="AdmtConstants.vbs" />
71
Dim objMigration
Dim objServiceAccountEnumeration
'
'Create instance of ADMT migration objects.
'
'
'Specify general migration options.
'
'
'Enumerate service accounts on specified computers.
'
objServiceAccountEnumeration.Enumerate admtData, _
Array("computer name1" ,"computer name2" )
72
Migrating Accounts
Applies to: Active Directory Migration Tool 3.1 (ADMT 3.1) and ADMT 3.2
The process of migrating account objects from a source domain to a target domain in another
Active Directory forest involves first migrating service accounts and then migrating global groups.
After the groups are in place in the target domain, you can migrate users according to the
process that you selected, either while using the security identifier (SID) history for resource
access or without using SID history for resource access. When the account object migration
process is complete, you can instruct users from the source domain to log on to the target
domain. The following illustration shows the process for migrating accounts between domains in
different forests.
Managed service accounts can be migrated using the Managed Service Account Migration
Wizard and the Computer Migration Wizard.
To transition service accounts, use the Active Directory Migration Tool (ADMT) to complete the
following tasks:
Migrate the service accounts from the source domain to the target domain.
Modify the services on each server in the source domain so that the services use the service account in
the target domain instead of in the source domain.
You can transition service accounts by using the ADMT snap-in, the ADMT command-line option,
or a script.
To transition service accounts by using the ADMT snap-in
1.
On the computer in the target domain on which ADMT is installed, log on by using the ADMT account
migration account.
2.
In the ADMT snap-in, click Action, and then click User Account Migration Wizard.
3.
Complete the User Account Migration Wizard by using the information in the following table.
74
75
On the computer in the target domain on which ADMT is installed, log on by using the ADMT account
migration account.
2.
At the command line, type the following command, and then press ENTER:
ADMT USER /N "<server_name1>" "<server_name2>" /SD:" <source_domain>" /TD:"
<target_domain>" /TO:" <target_OU>" /MSS:YES
Where SERVER_NAME1 and SERVER_NAME2 are the names of servers in the source domain that
run service accounts. As an alternative, you can include parameters in an option file that is
specified at the command line, as follows:
ADMT USER /N "<server_name1>" "<server_name2>" /O: "<option_file>.txt"
The following table lists the common parameters that are used for transitioning service
accounts, along with the command-line parameter and option file equivalents.
Parameters
Command-line syntax
<Source domain>
/SD:"SOURCE_DOMAIN"
SourceDomain=
<Target domain>
/TD:"TARGET_DOMAIN"
TargetDomain=
/TO:"TARGET_OU"
TargetOU=
Disable accounts
/DOT:ENABLETARGET
Migrate password
/PO:COMPLEX
/MSS:YES
MigrateSIDs=YES
/UUR:YES
UpdateUserRights=YES
Conflict management
/CO:IGNORE
(default)
(default)
(default)
DisableOption=ENABLE
PasswordOption=COMPL
ConflictOptions=IGNO
3.
Review the results that appear on the screen for any errors.
4.
Open Active Directory Users and Computers and locate the target service account OU. Verify that the
service accounts exist in the target domain OU.
To transition service accounts by using a script
Prepare a script that incorporates ADMT commands and options for transitioning service accounts by
using the following sample script. Copy the script to Notepad, and save the file with a .wsf file name
extension in the same folder as the AdmtConstants.vbs file.
<Job id=" TransitioningServiceAccountsBetweenForests" >
76
src="AdmtConstants.vbs" />
Dim objMigration
Dim objUserMigration
'
'Create instance of ADMT migration objects.
'
'
'Specify general migration options.
'
'
'Specify user migration specific options.
'
objUserMigration.MigrateSIDs = True
objUserMigration.UpdateUserRights = True
objUserMigration.MigrateServiceAccounts = True
'
'Migrate specified service accounts.
77
'
objUserMigration.Migrate admtData, _
Array("service account name1", "service account name2")
2.
A new global group object is created in the target domain, and a new primary security identifier (SID)
is created for the object in the target domain.
3.
To preserve resource access, the Active Directory Migration Tool (ADMT) adds the SID of the global
group in the source domain to the SID history attribute of the new global group in the target domain.
After the migration, events are logged in both the source and the target domain.
Note
If the user account migration process takes place over an extended period of time, you
might have to remigrate global groups from the source to the target domain. The
objective is to propagate membership changes that are made in the source domain
before the migration process is complete. For more information about remigrating global
groups, see Remigrating All Global Groups After All Batches Are Migrated, later in this
guide.
78
You can migrate global groups by using the ADMT snap-in, the ADMT command-line option, or a
script.
To migrate global groups by using the ADMT snap-in
1.
On the computer in the target domain on which ADMT is installed, log on by using the ADMT account
migration account.
2.
Use the Group Account Migration Wizard by performing the steps in the following table.
79
Wizard page
Action
Domain Selection
Group Selection
Group Options
3.
User Account
Conflict Management
When the wizard has finished running, click View Log, and review the migration log for any errors.
80
4.
Open the Active Directory Users and Computers snap-in, and then locate the target OU. Verify that the
global groups exist in the target domain OU.
To migrate global groups by using the ADMT command line option
1.
On the computer in the target domain on which ADMT is installed, log on by using the ADMT account
migration account.
2.
At the command line, type the ADMT Group command with the appropriate parameters, and then press
ENTER:
ADMT GROUP /N "<group_name1>" "<group_name2>" /SD:" <source_domain>" /TD:" <target
domain>" /TO:" <target OU>" /MSS:YES
As an alternative, you can include parameters in an option file that is specified at the command
line as follows:
ADMT GROUP /N "<group_name1>" "<group_name2>" /O: "<option_file>.txt"
The following table lists the common parameters that are used for migrating global groups,
along with the command-line parameter and option file equivalents.
Parameters
Command-line syntax
<Source domain>
/SD:"SOURCE_DOMAIN"
SourceDomain=
/SO:"SOURCE_OU"
SourceOU=
<Target domain>
/TD:"TARGET_DOMAIN"
TargetDomain=
/TO:"TARGET_OU"
TargetOU=
Migrate GG SIDs
/MSS:YES
MigrateSIDs=YES
Conflict management
/CO:IGNORE
(default)
ConflictOptions=IGNO
3.
Review the results that appear on the screen for any errors.
4.
Open the Active Directory Users and Computers snap-in and locate the target OU. Verify that the global
groups exist in the target domain OU.
To migrate global groups by using a script
Prepare a script that incorporates ADMT commands and options for migrating global groups by using the
following sample script. Copy the script to Notepad, and save the file with a .wsf file name extension in
the same folder as the AdmtConstants.vbs file.
<Job id=" MigratingGlobalGroupsBetweenForests" >
<Script language="VBScript"
src="AdmtConstants.vbs" />
81
Dim objMigration
Dim objGroupMigration
'
'Create instance of ADMT migration objects.
'
'
'Specify general migration options.
'
'
'Specify group migration specific options.
'
objGroupMigration.MigrateSIDs = True
'
'Migrate specified group objects.
'
82
Private keys that are associated with EFS, Secure/Multipurpose Internet Mail Extensions (S/MIME),
and other certificates
For this reason, it is important to test user migrations. Use your test migration account to identify
any properties that did not migrate, and update user configurations in the target domain
accordingly.
Complete the following steps to migrate user accounts to the target domain:
1.
Migrate managed service accounts. Managed service accounts must be migrated before computers.
2.
Migrate all the user accounts with the account enabled in the source domain, disabled in the target
domain, with complex password selected, and with no attributes migrated.
3.
83
4.
5.
Before you migrate the batch of user accounts, verify that local profile and workstation migration
succeeded for all users in the batch. Do not migrate any user account for which profile or workstation
migration failed. This will result in users overwriting their existing profiles when they log on to the
target domain.
6.
Remigrate user accounts in batches with the account set to expire in the source domain in seven days,
the target account enabled, with password migration selected, and all attributes migrated.
7.
After each batch, remigrate all global groups to update any group membership changes.
8.
9.
After all users are migrated, run a final global group migration to update any group membership
changes.
Migrating user accounts in batches helps you to track the accounts that have been migrated and
to test the success of each migration step. If the organizational unit (OU) structure for the target
domain is the same as the OU structure for the source domain, migrate groups of users based on
OU. If the OU structures are not the same, select an alternative way to group users based on the
structure of your organization. For example, you might migrate users by business unit or by floor
to enable you to consolidate help desk resources.
If you plan to retain your source domain OU structure, migrate the OUs along with the users that
they contain. For example, if your source domain is a Windows Server 2003 Active Directory
environment that has a functional OU structure, and the target domain does not have an OU
structure, migrate OUs from the source domain.
If you created a new OU structure in the target domain, migrate batches of users without the
OUs. For example, if your source environment was a Windows NT 4.0 domain that you upgraded
to a Windows Server 2003 domain, the source domain might not have an existing OU structure;
therefore, you can migrate users without migrating OUs.
For more information about creating an OU structure, see Designing Organizational Units for
Delegation of Administration (http://go.microsoft.com/fwlink/?LinkId=76628).
Until you migrate all user and group accounts, continue to administer global group membership in
the source domain. To support a rollback strategy, manually synchronize any changes that you
make to users in the target domain with the existing user accounts in the source domain. For
more information about administering users and groups during the interforest restructure process,
see Managing Users, Groups, and User Profiles, earlier in this guide.
If you are migrating OUs when you migrate user accounts, migrate the groups that belong to
those OUs to the target domain OU during the user account migration process. When you
migrate global groups by using the global group migration process, they are placed in the target
OU in the target domain. If you migrate OUs from the source to the target domain, select the
option to move the global groups to the target domain at the same time. This way, the groups are
moved from the target OU that they were placed in during the initial global group migration to the
OU in which they belong.
84
Using ADMT to migrate user accounts preserves group memberships. Because global groups
can contain only members from the domain in which the group is located, when users are
migrated to a new domain, the user accounts in the target domain cannot be members of the
global groups in the source domain. As part of the migration process, ADMT identifies the global
groups in the source domain that the user accounts belong to, and then determines whether the
global groups have been migrated. If ADMT identifies global groups in the target domain that the
migrated users belonged to in the source domain, the tool adds the users to the appropriate
global groups in the target domain.
Using ADMT to migrate user accounts also preserves user passwords. After the user accounts
are migrated to and enabled in the target domain, the users can log on to the target domain by
using their original passwords. After they log on, the users are prompted to change the password.
If the user account migration process is successful but the password migration process fails,
ADMT creates a new complex password for the user account in the target domain. By default,
ADMT stores new complex passwords in the C:\Program Files\Active Directory Migration
Tool\Logs\Password.txt file.
If you have a Group Policy setting on the target domain that does not allow blank passwords (the
Default Domain Policy/Computer Configuration/Security Settings/Account
Policies/Password Policy/Minimum password length setting is set to any number other than
zero), password migration will fail for any user who has a blank password. ADMT generates a
complex password for that user, and writes an error to the error log.
Establish a method for notifying users who have been assigned new passwords. For example,
you can create a script to send an e-mail message to users to notify them of their new
passwords.
The following illustration shows the steps involved in migrating accounts if you are using SID
history for resource access.
85
Use the Managed Service Account Migration Wizard or admt managedserviceaccount command line
tool to migrate managed service account objects to the target domain, as explained in this topic.
2.
Use the Computer Migration Wizard or admt computer command line tool to migrate the computers
that host the managed service accounts. For more information about migrating computers as part of an
interforest migration, see Remigrating User Accounts and Migrating Workstations in Batches. For
more information about migrating computers as part of an intraforest migration, see Migrate
Workstations and Member Servers.
86
The managed service accounts that were migrated in the previous step and that were
originally installed on the migrated computers are identified during the computer migration.
After the computer migration is complete, the managed service accounts are re-installed on
the computer in the target domain (unless you request to skip them). If you have run security
translation on the member servers that have resources that grant permission to the managed
service accounts, the accounts have the same permissions for resource access in the target
domain as they had in the source domain.
Important
If you are migrating managed service accounts between domains within the same
forest, run security translation on the member servers in the source domain that have
resources that grant permission to the managed service accounts. Security
translation is not normally necessary during an intraforest migration because a SID is
moved with an account. But managed service accounts that are migrated between
domains in the same forest are copied. A new account is created in the target domain
and the account properties (excluding SID) are copied from the source domain.
Therefore, you need to run security translation.
If the resources in the source domain that grant permission to a managed service
account are hosted on the same computer as the managed service account, then you
should select security translation on the appropriate resources (Files and folders,
Local groups, and so on) on the Translate Objects page of the Computer Migration
Wizard. If the resources are on other computers that are not being migrated, then you
need to run the Security Translation Wizard on those computers and on the Security
Translation Options page, select Previously migrated objects or explicitly provide
the MSA accounts in a SID mapping file. For more information about translation
security, see Translating Security on Your Member Servers.
To migrate managed service accounts by using the ADMT snap-in
1.
On the computer in the target domain on which ADMT is installed, log on by using the ADMT account
migration account.
2.
In the ADMT snap-in, click Action, and then click Managed Service Account Migration Wizard.
3.
Complete the Managed Service Account Migration Wizard by using the information in the following
table.
87
Wizard page
Action
Domain Selection
Wizard page
Action
Or
Click Read objects from an include file, and
then click Next. Type the location of the include
file, and then click Next.
Organizational Unit Selection
4.
When the wizard has finished running, click View Log, and then review the migration log for any errors.
5.
Start Active Directory Users and Computers, and then verify that the managed server accounts exist in the
appropriate OU in the target domain.
To migrate managed service accounts by using the ADMT command-line option
1.
On the computer in the target domain on which ADMT is installed, log on by using the ADMT account
migration account.
2.
At the command line, type the following command, and then press ENTER:
ADMT MANAGEDSERVICEACCOUNT /N "<managed service account1_name>" "<managed service
account2_name>" /IF:NO /SD:"<source_domain>" /TD:"<target_domain>" /UUR:YES /FGM:YES
89
/MSS:YES
service account2_name>
As an alternative, you can include parameters in an option file that is specified at the command
line as follows:
ADMT MANAGEDSERVICEACCOUNT /N "<managed service account1_name>" "<managed service
account2_name>" /O:"<option_file>.txt"
The following table lists the common parameters that are used for the migrating managed
service accounts, along with the command-line parameter and option file equivalents.
Values
Command-line syntax
Interforest migration
/IF:No
Intraforest=No
<Source domain>
/SD:"SOURCE_DOMAIN"
SourceDomain=
<Target domain>
/TD:"TARGET_DOMAIN"
TargetDomain=
/UUR:Yes
UpdateUserRights=
/FGM:Yes
FixGroupMembershi
/MSS:Yes
MigrateSIDs=Yes
Note
You can migrate SIDs for
managed service accounts only
between forests. An error is
returned if you use this
parameter during an intraforest
migration.
3.
Review the results that are displayed on the screen for any errors.
For managed service accounts that are hosted on member computers in the source domain, you
can include the member computer when you perform computer migration and the managed
service account will be installed on the member computer in the target domain after the computer
is migrated.
Note
Built-in accounts (such as Administrators, Users, and Power Users) cannot be
Active Directory Migration Tool (ADMT) migration objects. Because built-in account
security identifiers (SIDs) are identical in every domain, migrating these accounts to a
target domain results in duplicate SIDs in a single domain. Every SID in a domain must
be unique. Well-known accounts (such as Domain Admins and Domain Users) also
cannot be ADMT migration objects.
The ADMT user account migration process includes the following steps:
1.
2.
ADMT creates a new user object in the target domain and a new primary SID for the new user account.
3.
ADMT adds the original SID of the user account to the SID history attribute of the new user account.
4.
5.
If ADMT identifies global groups in the target domain that the migrated users belonged to in the source
domain, the tool adds the users to the appropriate global groups in the target domain.
During the migration, audit events are logged in both the source and the target domains.
You can migrate user accounts by using the ADMT snap-in, by using the ADMT command-line
option, or by using a script. If you are migrating user accounts that have authentication
mechanism assurance enabled, use an include file. In the include file, specify the original user
principal names (UPNs) from the source domain as the target UPNs so that you can keep the
authentication mechanism assurance working. For more information about using an include file,
see Use an Include File.
Important
When you start a user migration with SID history from the command line or from a script,
you must perform the migration on a domain controller in the target domain.
To migrate the current batch of users by using the ADMT snap-in
1.
On the computer in the target domain on which ADMT is installed, log on by using the ADMT account
migration account.
2.
Use the User Account Migration Wizard by performing the steps in the following table.
91
Wizard page
Action
Domain Selection
User Selection
Password Options
92
Wizard page
Action
User Account
User Options
Conflict Management
3.
When the wizard has finished running, click View Log, and then review the migration log for any errors.
4.
Start Active Directory Users and Computers, and then verify that the user accounts exist in the
appropriate OU in the target domain.
To migrate user accounts by using the ADMT command-line option
1.
On a domain controller in the target domain on which ADMT is installed, log on by using the ADMT
account migration account.
Important
When you start a user migration with SID history from the command line, you must
perform the migration on a domain controller in the target domain.
2.
User
As an alternative, you can include parameters in an option file that is specified at the command
93
line as follows:
ADMT USER /N "<user_name1>" "<user_name2>"
/O "<option_file>.txt"
The following table lists the common parameters that are used for migrating user accounts,
along with the command-line parameter and option file equivalents.
Parameters
Command-line syntax
<Source domain>
/SD:"SOURCE_DOMAIN"
SourceDomain=
<Target domain>
/TD:"TARGET_DOMAIN"
TargetDomain=
/TO:"TARGET_OU"
TargetOU=
Migrate SIDs
/MSS:YES
MigrateSIDs=YES
Disable option
/DOT:DISABLETARGET
DISABLEOPTION=DISABL
Source expiration
/SEP:7
SOURCEEXPIRATION=7
Conflict management
/CO:IGNORE
/TRP:YES
/UUR:NO
UpdateUserRights=NO
Password options
/PO:COMPLEX
PasswordOption=COMPL
(default)
(default)
ConflictOptions=IGNO
TranslateRoamingProf
3.
Review the results that are displayed on the screen for any errors.
4.
Open Active Directory Users and Computers and locate the target OU. Verify that the users exist in the
target OU.
To migrate user accounts by using a script
Prepare a script that incorporates ADMT commands and options for migrating users by using the
following sample script. Copy the script to Notepad, and save the file with a .wsf file name extension in
the same folder as the AdmtConstants.vbs file.
In your script, specify the source and target container names in the relative canonical format.
For example, if the container is a child OU named Sales and its parent OU is named West,
specify West/Sales as the container name. For more information, see TemplateScripts.vbs in
the ADMT installation folder.
<Job id=" MigratingAllUserAccountsBetweenForests" >
<Script language="VBScript"
src="AdmtConstants.vbs" />
94
Dim objMigration
Dim objUserMigration
'
'Create instance of ADMT migration objects.
'
'
'Specify general migration options.
'
'
'Specify user migration specific options.
'
objUserMigration.MigrateSIDs = True
objUserMigration.TranslateRoamingProfile = True
objUserMigration.UpdateUserRights = False
objUserMigration.FixGroupMembership = True
objUserMigration.MigrateServiceAccounts = False
'
'Migrate specified user objects.
'
95
96
Note
The night before you notify the users to log on by using their new accounts in the target
domain, translate the local user profiles. Translating profiles the night before ensures that
the new user profile reflects the most current user settings.
You can translate local user profiles by using the ADMT snap-in, the ADMT command-line option,
or a script.
To translate local user profiles by using the ADMT snap-in
1.
For each workstation in the source domain that you migrate, add the ADMT resource migration account
to the local Administrators group.
2.
On the computer in the target domain on which ADMT is installed, log on by using the ADMT account
migration account.
3.
Use the Security Translation Wizard by performing the steps in the following table.
97
Wizard page
Action
Domain Selection
4.
Translate Objects
Click Replace.
Review the results that are displayed on the screen for any errors. After the wizard completes, click View
Migration Log to see the list of computers, completion status, and the path to the log file for each
computer. If an error is reported for a computer, you will have to refer to the log file on that computer to
review any problems with local groups. The log file for each computer is named MigrationTASKID.log
and is stored in the Windows\ADMT\Logs\Agents folder.
To translate local user profiles by using the ADMT command-line option
1.
On the computer in the target domain on which ADMT is installed, log on by using the ADMT account
migration account.
2.
Security
ENTER.
ADMT SECURITY /N "<computer_name1>" "<computer_name2>"
As an alternative, you can include parameters in an option file that is specified at the command
line as follows:
ADMT SECURITY /N "<computer_name1>" "<computer_name2>" /O "<option_file>.txt"
The following table lists the common parameters that are used for migrating user accounts,
along with the command-line parameter and option file equivalents.
3.
Parameters
Command-line syntax
<Source domain>
/SD:"SOURCE_DOMAIN"
SourceDomain=
<Target domain>
/TD:"TARGET_DOMAIN"
TargetDomain=
/TOT:REPLACE
TranslateOption=REPL
/TUP:YES
TranslateUserProfile
Review the results that are displayed on the screen for any errors. After the wizard completes, click View
Migration Log to see the list of computers, completion status, and the path to the log file for each
computer. If an error is reported for a computer, you will have to refer to the log file on that computer to
review any problems with local groups. The log file for each computer is named MigrationTASKID.log
and is stored in the Windows\ADMT\Logs\Agents folder.
To translate local user profiles by using a script
Prepare a script that incorporates ADMT commands and options for translating local user profiles by
using the following sample script. Copy the script to Notepad, and save the file with a .wsf file name
extension in the same folder as the AdmtConstants.vbs file.
<Job id=" TranslatingLocalProfilesBetweenForests" >
<Script language="VBScript"
src="AdmtConstants.vbs" />
Dim objMigration
Dim objSecurityTranslation
'
'Create instance of ADMT migration objects.
99
'
'
'Specify general migration options.
'
'
'Specify security translation specific options.
'
objSecurityTranslation.TranslationOption = admtTranslateReplace
objSecurityTranslation.TranslateUserProfiles = True
'
'Perform security translation on specified computer objects.
'
objSecurityTranslation.Translate admtData, _
Array("computer name1" ,"computer name2" )
100
On the computer in the target domain on which you installed ADMT, log on by using the ADMT resource
migration account.
2.
Use the Computer Migration Wizard by performing the steps in the following table.
101
Wizard page
Action
Domain Selection
Computer Selection
Click Browse.
In the Browse for Container dialog box, locate
the target domain Computers container or the
appropriate OU, and then click OK.
Translate Objects
Click Add.
Computer Options
Wizard page
Action
3.
Review the results that are displayed on the screen for any errors. After the wizard completes, click View
Migration Log to see the list of computers, completion status, and the path to the log file for each
computer. If an error is reported for a computer, you will have to refer to the log file on that computer to
review any problems with local groups. The log file for each computer is named MigrationTASKID.log
and is stored in the Windows\ADMT\Logs\Agents folder.
4.
Open Active Directory Users and Computers, and verify that the workstations exist in the appropriate OU
in the target domain.
To migrate workstations by using the ADMT command-line option
1.
On the computer in the target domain on which ADMT is installed, log on by using the ADMT resource
migration account.
2.
At the command line, type the ADMT Computer command with the appropriate parameters, and then
press ENTER.
ADMT COMPUTER /N "<computer_name1>" "<computer_name2>" /SD:"<source_domain>"
/TD:"<target_domain>" /TO:"<target_OU>" [/M: <managed service account name1> <managed
service account name2>] [/UALLMSA:Yes] /RDL:5
As an alternative, you can include parameters in an option file that is specified at the command
line as follows:
ADMT COMPUTER /N "<computer_name1>" "<computer_name2>" /O:" <option_file>.txt"
The following table lists the common parameters that are used for workstation migration, along
with the command-line parameter and option file equivalents.
103
Parameters
Command-line syntax
<Source domain>
/SD:"SOURCE_DOMAIN"
SourceDomain=
/SO:"SOURCE_OU"
SourceOU="SOURCE_OU
<Target domain>
/TD:"TARGET_DOMAIN"
TargetDomain=
/UALLMSA: YES
UpdateAllManagedServiceA
/M NAME
UPDATEMSANAME=
1 NAME 2
Note
The /M parameter takes
precedence over the
/UALLMSA parameter.
<Target OU> location
/TO:"TARGET_OU"
TargetOU="TARGET_OU
/RDL:5
RestartDelay=5
/TOT:ADD
TranslationOption=ADD
/TUR:YES
TranslateUserRights=YES
/TLG:YES
TranslateLocalGroups=YES
3.
Review the results that are displayed on the screen for any errors. The migration log lists computers,
completion status, and the path to the log file for each computer. If an error is reported for a computer,
you will have to refer to the log file for that computer to review any problems with local groups. The log
file for each computer is named MigrationTASKID.log and is stored in the Windows\ADMT\Logs\Agents
folder.
4.
Open Active Directory Users and Computers and locate the target OU. Verify that the workstations and
member servers exist in the target OU.
To migrate workstations by using a script
Prepare a script that incorporates ADMT commands and options for migrating workstations by using the
following sample script Copy the script to Notepad, and save the file with a .wsf file name extension in
the same folder as the AdmtConstants.vbs file.
<Job id="MigratingWorkstationsBwtweenForest" >
<Script language="VBScript"
src="AdmtConstants.vbs" />
104
Dim objMigration
Dim objComputerMigration
'
'Create instance of ADMT migration objects.
'
'
'Specify general migration options.
'
'
'Specify computer migration specific options.
'
objComputerMigration.RestartDelay = 1
objComputerMigration.TranslationOption = admtTranslateAdd
objComputerMigration.TranslateLocalGroups = True
objComputerMigration.TranslateUserRights = True
objComputerMigration.UpdateAllManagedServiceAccounts = True
'
'Migrate computer objects on specified computer objects.
'
105
objComputerMigration.Migrate admtData, _
Array("computer name1" ,"computer name2" )
On the computer in the target domain on which ADMT is installed, log on by using the ADMT account
migration account.
2.
Complete the User Account Migration Wizard by performing the steps in the following table.
106
Wizard page
Action
Domain Selection
User Selection
Password Options
Wizard page
Action
User Account
User Options
Conflict Management
3.
When the wizard has finished, click View Log, and review the migration log for any errors.
4.
Open Active Directory Users and Computers, and verify that the user accounts exist in the appropriate
OU in the target domain.
To migrate the current batch of users by using the ADMT command-line option
1.
On the computer in the target domain on which ADMT is installed, log on by using the ADMT account
migration account.
2.
At the command line, type the ADMT User command with the appropriate parameters, and then press
ENTER.
ADMT USER /N "<user_name1>" "<user_name2>"
As an alternative, you can include parameters in an option file that is specified at the command
line as follows:
ADMT USER /N "<user_name1>" "<user_name2>"
/O "<option_file>.txt"
The following table lists the common parameters that are used for migrating user accounts,
along with the command-line parameter and option file equivalents.
108
Parameters
Command-line syntax
<Source domain>
/SD:"SOURCE_DOMAIN"
SourceDomain=
/SO:"SOURCE_OU"
SourceOU=
<Target domain>
/TD:"TARGET_DOMAIN"
TargetDomain=
/TO:"TARGET_OU"
TargetOU=
Migrate SIDs
/MSS:YES
MigrateSIDs=YES
Conflict management
/CO:REPLACE
ConflictOptions=REPL
/TRP:YES
/UUR:YES
Password options
/PO:COPY /PS:<NAME OF
(default)
TranslateRoamingProf
UpdateUserRights=YES
PES SERVER>
PasswordOption=COPY
PasswordServer=:
Source expiration
/SEP:7
SourceExpiration=7
3.
Review the results that are displayed on the screen for any errors.
4.
Open Active Directory Users and Computers, and locate the target OU. Verify that the users exist in the
target OU.
To migrate the current batch of user accounts by using a script
Prepare a script that incorporates ADMT commands and options for migrating users by using the
following sample script. Copy the script to Notepad, and save the file with a .wsf file name extension in
the same folder as the AdmtConstants.vbs file.
<Job id="MigratingUserAccountsInBatchesBetweenForests" >
<Script language="VBScript"
src="AdmtConstants.vbs" />
Dim objMigration
Dim objUserMigration
'
'Create instance of ADMT migration objects.
109
'
'
'Specify general migration options.
'
'
'Migrate specified user objects.
'
110
</Script>
</Job>
On the computer in the target domain on which ADMT is installed, log on by using the ADMT account
migration account.
2.
Use the Group Account Migration Wizard by performing the steps in the following table.
111
Wizard page
Action
Domain Selection
Group Selection
Group Options
User Account
Wizard page
Action
3.
When the wizard has finished running, click View Log, and review the migration log for any errors.
4.
Open Active Directory Users and Computers, and locate the target OU. Verify that the global groups exist
in the target domain OU.
To remigrate global groups by using the ADMT command-line option
1.
On a domain controller in the target domain on which ADMT is installed, log on by using the ADMT
account migration account
113
Important
When you start a global group migration with SID history from the command line, you
must perform the migration on a domain controller in the target domain.
2.
Group
As an alternative, you can include parameters in an option file that is specified at the command
line as follows:
ADMT GROUP /N "<group_name1>" "<group_name2>" /O: "<option_file>.txt"
The following table lists the common parameters that are used for migrating global groups,
along with the command-line parameter and option file equivalents.
Parameters
Command-line syntax
<Source domain>
/SD:"SOURCE_DOMAIN"
SourceDomain=
/SO:"SOURCE_OU"
SourceOU=
<Target domain>
/TD:"TARGET_DOMAIN"
TargetDomain=
/TO:"TARGET_OU"
TargetOU=
Migrate GG SIDs
/MSS:YES
MigrateSIDs=YES
Conflict management
/CO:REPLACE
ConflictOptions=REPL
3.
Review the results that are displayed on the screen for any errors.
4.
Open Active Directory Users and Computers, and locate the target OU. Verify that the global groups exist
in the target domain OU.
To remigrate global groups by using a script
Prepare a script that incorporates ADMT commands and options for migrating global groups by using the
following sample script. Copy the script to Notepad, and save the file with a .wsf file name extension in
the same folder as the AdmtConstants.vbs file.
<Job id=" RemigratingGlobalGroupsBetweenForests" >
<Script language="VBScript"
src="AdmtConstants.vbs" />
114
Dim objMigration
Dim objGroupMigration
'
'Create instance of ADMT migration objects.
'
'
'Specify general migration options.
'
'
'Specify group migration specific options.
'
objGroupMigration.MigrateSIDs = True
'
'Migrate specified group objects.
'
115
</Script>
</Job>
Migrate managed service accounts. Managed service accounts must be migrated before computers.
2.
Migrate all users. Use the Fix users group membership option both to have the Active Directory
Migration Tool (ADMT) identify global groups in the target domain that the user belonged to in the
source domain and to add the user to the appropriate global group in the target domain. For this initial
user migration, leave the user account enabled in source domain and disabled in the target domain.
3.
Translate security in add mode for files, shares, printers, local groups, and domain local groups.
4.
5.
6.
Before you migrate the batch of user accounts, verify that local profile and workstation migration
succeeded for all users in the batch. Do not migrate any user account for which profile or workstation
migration failed, because this will result in users overwriting their existing profiles when they log onto
the target domain.
7.
Remigrate user accounts in small batches with the accounts in the source domain that are set to expire
in seven days with the target accounts enabled, password migration selected, and all attributes selected
for migration.
116
8.
After each batch, remigrate all global groups to update any group membership changes.
9.
After all users are migrated, run a final global group migration to update any group membership
changes
10. Translate security in remove mode for files, shared folders, printers, local groups, and domain local
groups.
11. Notify users in the batch to log on to the target domain.
Until you migrate all user and group accounts, continue to administer global group membership in
the source domain.
The following illustration shows the steps involved in migrating accounts that are not using SID
history for resource access.
Use the Managed Service Account Migration Wizard or admt managedserviceaccount command line
tool to migrate managed service account objects to the target domain, as explained in this topic.
2.
Use the Computer Migration Wizard or admt computer command line tool to migrate the computers
that host the managed service accounts. For more information about migrating computers as part of an
interforest migration, see Remigrating User Accounts and Migrating Workstations in Batches. For
more information about migrating computers as part of an intraforest migration, see Migrate
Workstations and Member Servers.
The managed service accounts that were migrated in the previous step and that were
originally installed on the migrated computers are identified during the computer migration.
After the computer migration is complete, the managed service accounts are re-installed on
the computer in the target domain (unless you request to skip them). If you have run security
translation on the member servers that have resources that grant permission to the managed
service accounts, the accounts have the same permissions for resource access in the target
domain as they had in the source domain.
Important
If you are migrating managed service accounts between domains within the same
forest, run security translation on the member servers in the source domain that have
117
On the computer in the target domain on which ADMT is installed, log on by using the ADMT account
migration account.
2.
In the ADMT snap-in, click Action, and then click Managed Service Account Migration Wizard.
3.
Complete the Managed Service Account Migration Wizard by using the information in the following
table.
118
Wizard page
Action
Domain Selection
Wizard page
Action
Or
Click Read objects from an include file, and
then click Next. Type the location of the include
file, and then click Next.
Organizational Unit Selection
4.
When the wizard has finished running, click View Log, and then review the migration log for any errors.
5.
Start Active Directory Users and Computers, and then verify that the managed server accounts exist in the
appropriate OU in the target domain.
To migrate managed service accounts by using the ADMT command-line option
1.
On the computer in the target domain on which ADMT is installed, log on by using the ADMT account
migration account.
2.
At the command line, type the following command, and then press ENTER:
ADMT MANAGEDSERVICEACCOUNT /N "<managed service account1_name>" "<managed service
account2_name>" /IF:NO /SD:"<source_domain>" /TD:"<target_domain>" /UUR:YES /FGM:YES
120
/MSS:YES
service account2_name>
As an alternative, you can include parameters in an option file that is specified at the command
line as follows:
ADMT MANAGEDSERVICEACCOUNT /N "<managed service account1_name>" "<managed service
account2_name>" /O:"<option_file>.txt"
The following table lists the common parameters that are used for the migrating managed
service accounts, along with the command-line parameter and option file equivalents.
Values
Command-line syntax
Interforest migration
/IF:No
Intraforest=No
<Source domain>
/SD:"SOURCE_DOMAIN"
SourceDomain=
<Target domain>
/TD:"TARGET_DOMAIN"
TargetDomain=
/UUR:Yes
UpdateUserRights=
/FGM:Yes
FixGroupMembershi
/MSS:Yes
MigrateSIDs=Yes
Note
You can migrate SIDs for
managed service accounts only
between forests. An error is
returned if you use this
parameter during an intraforest
migration.
3.
Review the results that are displayed on the screen for any errors.
For managed service accounts that are hosted on member computers in the source domain, you
can include the member computer when you perform computer migration and the managed
service account will be installed on the member computer in the target domain after the computer
is migrated.
Note
Built-in accounts (such as Administrators, Users, and Power Users) cannot be
Active Directory Migration Tools (ADMT) migration objects. Because built-in account
security identifiers (SIDs) are identical in every domain, migrating these accounts to a
target domain results in duplicate SIDs in a single domain. Every SID in a domain must
be unique. Well-known accounts (such as Domain Admins and Domain Users) also
cannot be ADMT migration objects.
The ADMT user account migration process includes the following steps:
1.
2.
ADMT creates a new user object in the target domain and a new primary SID for the new user account.
3.
ADMT adds the original SID of the user account to the SID history attribute of the new user account.
4.
5.
If ADMT identifies global groups in the target domain that the migrated users belonged to in the source
domain, the tool adds the users to the appropriate global groups in the target domain.
During the migration, audit events are logged in both the source and the target domains.
You can migrate user accounts by using the ADMT snap-in, the ADMT command-line option, or a
script. If you are migrating user accounts that have authentication mechanism assurance
enabled, use an include file. In the include file, specify the original user principal names (UPNs)
from the source domain as the target UPNs to keep the authentication mechanism assurance
working. For more information about using an include file, see Use an Include File.
To migrate user accounts by using the ADMT snap-in
1.
On the computer in the target domain on which ADMT is installed, log on by using the ADMT account
migration account.
2.
Use the User Account Migration Wizard by performing the steps in the following table.
122
Wizard page
Action
Domain Selection
User Selection
Password Options
User Account
Wizard page
Action
Conflict Management
3.
When the wizard finishes, click View Log, and review the migration log for any errors.
4.
Open Active Directory Users and Computers, and verify that the user accounts exist in the appropriate
OU in the target domain.
To migrate user accounts by using the ADMT command-line option
1.
On the computer in the target domain on which ADMT is installed, log on by using the ADMT account
migration account.
2.
User
As an alternative, you can include parameters in an option file that is specified at the command
line, as follows:
ADMT USER /N "<user_name1>" "<user_name2>"
/O "<option_file>.txt"
The following table lists the common parameters that are used for migrating user accounts,
along with the command-line parameter and option file equivalents.
124
Parameters
Command-line syntax
<Source domain>
/SD:"SOURCE_DOMAIN"
SourceDomain=
/SO:"SOURCE_OU"
SourceOU=
<Target domain>
/TD:"TARGET_DOMAIN"
TargetDomain=
/TO:"TARGET_OU"
TargetOU=
Migrate SIDs
/MSS:YES
MigrateSIDs=YES
Conflict management
/CO:IGNORE
/TRP:YES
/UUR:YES
Password options
/PO:COMPLEX
(default)
(default)
ConflictOptions=IGNO
TranslateRoamingProf
UpdateUserRights=YES
(default)
PasswordOption=COMPL
3.
Review the results that appear on the screen for any errors.
4.
Open Active Directory Users and Computers and locate the target OU. Verify that the users exist in the
target OU.
To migrate user accounts by using a script
Prepare a script that incorporates ADMT commands and options for migrating users by using the
following sample script. Copy the script to Notepad, and save the file with a .wsf file name extension in
the same folder as the AdmtConstants.vbs file.
<Job id=" MigratingAllUserAccountsBetweenForests" >
<Script language="VBScript"
src="AdmtConstants.vbs" />
Dim objMigration
Dim objUserMigration
'
'Create instance of ADMT migration objects.
'
125
'
'Specify general migration options.
'
'
'Specify user migration specific options.
'
objUserMigration.MigrateSIDs = True
objUserMigration.TranslateRoamingProfile = True
objUserMigration.UpdateUserRights = True
objUserMigration.FixGroupMembership = True
objUserMigration.MigrateServiceAccounts = False
'
'Migrate specified user objects.
'
126
On the computer in the target domain on which ADMT is installed, log on by using the ADMT account
migration account.
2.
Use the Security Translation Wizard by performing the steps in the following table.
127
Wizard page
Action
Domain Selection
Computer Selection
Translate Objects
3.
Click Add.
Review the results that are displayed on the screen for any errors. After the wizard completes, click View
Migration Log to see the list of computers, completion status, and the path to the log file for each
computer. If an error is reported for a computer, you will have to refer to the log file on that computer to
review any problems with local groups. The log file for each computer is named MigrationTASKID.log,
and it is stored in the Windows\ADMT\Logs\Agents folder.
To translate security in Add mode on objects by using the ADMT command-line option
1.
On the computer in the target domain on which ADMT is installed, log on by using the ADMT account
migration account.
2.
At the command line, type the ADMT Security command with the appropriate parameters, and then press
128
ENTER::
ADMT SECURITY /N "<computer_name1>" "<computer_name2>"
As an alternative, you can include parameters in an option file that is specified at the command
line, as follows:
ADMT SECURITY /N " <computer_name1>" " <computer_name2>" /O "<option_file>.txt"
The following table lists the common parameters that are used for migrating user accounts,
along with the command-line parameter and option file equivalents.
3.
Parameters
Command-line syntax
<Source domain>
/SD:"SOURCE_DOMAIN"
SourceDomain=
<Target domain>
/TD:"TARGET_DOMAIN"
TargetDomain=
/TOT:Add
TranslateOption=ADD
Review the results that are displayed on the screen for any errors. After the wizard completes, click View
Migration Log to see the list of computers, completion status, and the path to the log file for each
computer. If an error is reported for a computer, you will have to refer to the log file on that computer to
review any problems with local groups. The log file for each computer is named MigrationTASKID.log,
and it is stored in the Windows\ADMT\Logs\Agents folder.
To translate security in Add mode on objects by using a script
Prepare a script that incorporates ADMT commands and options for translating security in Add mode on
objects by using the following sample script. Copy the script to Notepad, and save the file with a .wsf file
name extension in the same folder as the AdmtConstants.vbs file.
<Job id=" TranslatingSecurityInAddModeOnObjectsBetweenForests" >
<Script language="VBScript"
src="AdmtConstants.vbs" />
Dim objMigration
Dim objSecurityTranslation
'
'Create instance of ADMT migration objects.
'
129
'
'Specify general migration options.
'
'
'Specify security translation specific options.
'
objSecurityTranslation.TranslationOption = admtTranslateAdd
objSecurityTranslation.TranslateFilesAndFolders = True
objSecurityTranslation.TranslateLocalGroups = True
objSecurityTranslation.TranslatePrinters = True
objSecurityTranslation.TranslateRegistry = True
objSecurityTranslation.TranslateShares = True
objSecurityTranslation.TranslateUserProfiles = False
objSecurityTranslation.TranslateUserRights = True
'
'Perform security translation on specified computer objects.
'
objSecurityTranslation.Translate admtData, _
Array("computer name1" ,"computer name2" )
130
</Script>
</Job>
1.
For each workstation in the source domain that you are migrating, add the ADMT resource migration
account to the local Administrators group.
2.
On the computer in the target domain on which ADMT is installed, log on by using the ADMT account
migration account.
3.
Use the Security Translation Wizard by performing the steps in the following table.
Wizard page
Action
Domain Selection
Computer Selection
4.
Translate Objects
Click Replace.
Review the results that are displayed on the screen for any errors. After the wizard completes, click View
Migration Log to see the list of computers, completion status, and the path to the log file for each
computer. If an error is reported for a computer, you will have to refer to the log file on that computer to
review any problems with local groups. The log file for each computer is named MigrationTASKID.log,
132
On the computer in the target domain on which ADMT is installed, log on by using the ADMT account
migration account.
2.
Security
As an alternative, you can include parameters in an option file that is specified at the command
line as follows:
ADMT SECURITY /N "<computer_name1>" " <computer_name2>" /O "<option_file>.txt"
The following table lists the common parameters that are used for migrating user accounts,
along with the command-line parameter and option file equivalents.
3.
Parameters
Command-line syntax
<Source domain>
/SD:"SOURCE_DOMAIN"
SourceDomain=
<Target domain>
/TD:"TARGET_DOMAIN"
TargetDomain=
/TOT:REPLACE
TranslateOption=REPL
/TUP:YES
TranslateUserProfile
Review the results that appear on the screen for any errors. After the wizard completes, click View
Migration Log to see the list of computers, completion status, and the path to the log file for each
computer. If an error is reported for a computer, you will have to refer to the log file on that computer to
review any problems with local groups. The log file for each computer is named MigrationTASKID.log
and is stored in the Windows\ADMT\Logs\Agents folder.
To translate local user profiles by using a script
Prepare a script that incorporates ADMT commands and options for translating local user profiles by
using the following sample script. Copy the script to Notepad, and save the file with a .wsf file name
extension in the same folder as the AdmtConstants.vbs file.
<Job id=" TranslatingLocalProfilesBetweenForests" >
<Script language="VBScript"
src="AdmtConstants.vbs" />
133
Dim objMigration
Dim objSecurityTranslation
'
'Create instance of ADMT migration objects.
'
'
'Specify general migration options.
'
'
'Specify security translation specific options.
'
objSecurityTranslation.TranslationOption = admtTranslateReplace
objSecurityTranslation.TranslateUserProfiles = True
'
'Perform security translation on specified computer objects.
'
objSecurityTranslation.Translate admtData, _
Array("computer name1" ,"computer name2" )
134
On the computer in the target domain on which you installed ADMT, log on by using the ADMT resource
migration account.
2.
Use the Computer Migration Wizard by following the steps in the following table.
135
Wizard page
Action
Domain Selection
Computer Selection
Click Browse.
In the Browse for Container dialog box, locate
the target domain Computers container or the
appropriate organizational unit (OU), and then
click OK.
Translate Objects
Click Add.
Computer Options
Wizard page
Action
3.
Review the results that are displayed on the screen for any errors. After the wizard completes, click View
Migration Log to see the list of computers, completion status, and the path to the log file for each
computer. If an error is reported for a computer, you will have to refer to the log file on that computer to
review any problems with local groups. The log file for each computer is named MigrationTaskID.log,
and it is stored in the Windows\ADMT\Logs\Agents folder.
4.
Open Active Directory Users and Computers, and verify that the workstations exist in the appropriate OU
in the target domain.
To migrate workstations by using the ADMT command-line option
1.
On the computer in the target domain on which ADMT is installed, log on by using the ADMT resource
migration account.
2.
Computer
As an alternative, you can include parameters in an option file that is specified at the command
line, as follows:
ADMT COMPUTER /N "<computer_name1>" "<computer_name2>" /O:" <option_file>.txt"
The following table lists the common parameters that are used for workstation migration, along
with the command-line parameter and option file equivalents.
137
Parameters
Command-line syntax
<Source domain>
SD:"SOURCE_DOMAIN"
SourceDomain=
/SO:"SOURCE_OU"
SourceOU="SOURCE_OU
<Target domain>
/TD:"TARGET_DOMAIN"
TargetDomain=
/UALLMSA: YES
UpdateAllManagedServiceAc
/M: NAME
UPDATEMSANAME=
1 NAME 2
Note
The /M parameter takes
precedence over the
/UALLMSA parameter.
<Target OU> location
/TO:"TARGET_OU"
TargetOU="TARGET_OU
/RDL:5
RestartDelay=5
/TOT:ADD
TranslationOption=ADD
/TUR:YES
TranslateUserRights=YES
/TLG:YES
TranslateLocalGroups=YES
3.
Review the results that appear on the screen for any errors. The migration log lists computers, completion
status, and the path to the log file for each computer. If an error is reported for a computer, you will have
to refer to the log file for that computer to review any problems with local groups. The log file for each
computer is named MigrationTASKID.log, and it is stored in the Windows\ADMT\Logs\Agents folder.
4.
Open Active Directory Users and Computers, and locate the target OU. Verify that the workstations exist
in the target OU.
To migrate workstations by using a script
Prepare a script that incorporates ADMT commands and options for migrating workstations by using the
following sample script. Copy the script to Notepad, and save the file with a .wsf file name extension in
the same folder as the AdmtConstants.vbs file.
<Job id="MigratingWorkstationsBwtweenForest" >
<Script language="VBScript"
src="AdmtConstants.vbs" />
138
Dim objMigration
Dim objComputerMigration
'
'Create instance of ADMT migration objects.
'
'
'Specify general migration options.
'
'
'Specify computer migration specific options.
'
objComputerMigration.RestartDelay = 1
objComputerMigration.TranslationOption = admtTranslateAdd
objComputerMigration.TranslateLocalGroups = True
objComputerMigration.TranslateUserRights = True
objComputerMigration.UpdateAllManagedServiceAccounts = True
'
'Migrate computer objects on specified computer objects.
'
139
objComputerMigration.Migrate admtData, _
Array("computer name1" ,"computer name2" )
On the computer in the target domain on which ADMT is installed, log on by using the ADMT account
migration account.
2.
Use the User Account Migration Wizard by following the steps in the following table.
140
Wizard page
Action
Domain Selection
User Selection
Password Options
Wizard page
Action
User Account
User Options
Conflict Management
3.
When the wizard finishes, click View Log, and review the migration log for any errors.
4.
Open Active Directory Users and Computers and verify that the user accounts exist in the appropriate OU
in the target domain.
To remigrate the current batch of users by using the ADMT command-line option
1.
On the computer in the target domain on which ADMT is installed, log on by using the ADMT account
migration account.
2.
User
As an alternative, you can include parameters in an option file that is specified at the command
line, as follows:
ADMT USER /N "<user_name1>" "<user_name2>"
/O "<option_file>.txt"
The following table lists the common parameters that are used for migrating user accounts,
along with the command-line parameter and option file equivalents.
142
Parameters
Command-line syntax
<Source domain>
/SD:"SOURCE_DOMAIN"
SourceDomain=
/SO:"SOURCE_OU"
SourceOU=
<Target domain>
/TD:"TARGET_DOMAIN"
TargetDomain=
/TO:"TARGET_OU"
TargetOU=
Migrate SIDs
/MSS:YES
MigrateSIDs=YES
Conflict management
/CO:REPLACE
ConflictOptions=REPL
/TRP:YES
/UUR:YES
Password options
/PO:COPY /PS:<NAME OF
(default)
TranslateRoamingProf
UpdateUserRights=YES
PES SERVER>
PasswordOption=COPY
PasswordServer=:
Source expiration
/SEP:30
SourceExpiration=30
3.
Review the results that appear on the screen for any errors.
4.
Open Active Directory Users and Computers, and locate the target OU. Verify that the users exist in the
target OU.
To remigrate the current batch of user accounts by using a script
Prepare a script that incorporates ADMT commands and options for migrating users by using the
following sample script. Copy the script to Notepad, and save the file with a .wsf file name extension in
the same folder as the AdmtConstants.vbs file.
<Job id="MigratingUserAccountsInBatchesBetweenForests" >
<Script language="VBScript"
src="AdmtConstants.vbs" />
Dim objMigration
Dim objUserMigration
'
'Create instance of ADMT migration objects.
'
143
'
'Specify general migration options.
'
'
'Migrate specified user objects.
'
144
</Job>
On the computer in the target domain on which ADMT is installed, log on by using the ADMT account
migration account.
2.
Use the Group Account Migration Wizard by performing the steps in the following table.
145
Wizard page
Action
Domain Selection
Group Selection
Group Options
User Account
Wizard page
Action
source domain.
Object Property Exclusion
Conflict Management
3.
When the wizard has finished running, click View Log, and review the migration log for any errors.
4.
Open Active Directory Users and Computers, and locate the target OU. Verify that the global groups exist
in the target domain OU.
To remigrate global groups by using the ADMT command-line option
1.
On the computer in the target domain on which ADMT is installed, log on by using the ADMT account
migration account.
2.
Group
As an alternative, you can include parameters in an option file that is specified at the command
line, as follows:
ADMT GROUP /N "<group_name1>" "<group_name2>" /O: "<option_file>.txt"
The following table lists the common parameters that are used for migrating global groups,
along with the command-line parameter and option file equivalents.
3.
Parameters
Command-line syntax
<Source domain>
/SD:"SOURCE_DOMAIN"
SourceDomain=
/SO:"SOURCE_OU"
SourceOU=
<Target domain>
/TD:"TARGET_DOMAIN"
TargetDomain=
/TO:"TARGET_OU"
TargetOU=
Migrate GG SIDs
/MSS:YES
MigrateSIDs=YES
Conflict management
/CO:REPLACE
ConflictOptions=REPL
Review the results that appear on the screen for any errors.
147
4.
Open Active Directory Users and Computers, and locate the target OU. Verify that the global groups exist
in the target domain OU.
To remigrate global groups by using a script
Prepare a script that incorporates ADMT commands and options for migrating global groups by using the
following sample script. Copy the script to Notepad, and save the file with a .wsf file name extension in
the same folder as the AdmtConstants.vbs file.
<Job id=" RemigratingGlobalGroupsBetweenForests" >
<Script language="VBScript"
src="AdmtConstants.vbs" />
Dim objMigration
Dim objGroupMigration
'
'Create instance of ADMT migration objects.
'
'
'Specify general migration options.
'
'
'Specify group migration specific options.
148
'
objGroupMigration.MigrateSIDs = True
'
'Migrate specified group objects.
'
On the computer in the target domain on which ADMT is installed, log on by using the ADMT account
migration account.
2.
Use the Security Translation Wizard by following the steps in the following table.
149
Wizard page
Action
Domain Selection
Computer Selection
Translate Objects
Click Remove.
1.
2.
option
On the computer in the target domain on which ADMT is installed, log on by using the ADMT account
migration account.
At the command line, type the ADMT Security command with the appropriate parameters, and then press
ENTER:
ADMT SECURITY /N "<computer_name1>" "<computer_name2>"
As an alternative, you can include parameters in an option file that is specified at the command
line, as follows:
150
Prepare
a script that
incorporates ADMT commands
and options for
security in remove mode
ADMT SECURITY
/N "<computer_name1>"
"<computer_name2>"
/O translating
"<option_file>.txt"
on objects by using the following sample script. Copy the script to Notepad, and save the file with a .wsf
The
following
tableinlists
the common
that are used
file name
extension
the same
folder asparameters
the AdmtConstants.vbs
file. for migrating user accounts,
along with the command-line parameter and option file equivalents.
<Job id=" TranslatingSecurityInRemoveModeOnObjectsBetweenForests" >
Parameters
<Script language="VBScript"
<Source
<Scriptdomain>
language="VBScript"
/SD:"SOURCE_DOMAIN"
SourceDomain=
Option
Explicit
<Target
domain>
/TD:"TARGET_DOMAIN"
TargetDomain=
/TOT:Remove
TranslateOption=REMO
>
Dim objMigration
3.
Review
theobjSecurityTranslation
results that are displayed on the screen for any errors. After the wizard completes, click View
Dim
Migration Log to see the list of computers, completion status, and the path to the log file for each
computer. If an error is reported for a computer, you will have to refer to the log file on that computer to
review'any problems with local groups. The log file for each computer is named MigrationTASKID.log,
and it is
stored in
the Windows\ADMT\Logs\Agents
folder.
'Create
instance
of ADMT migration objects.
'
'
'Specify general migration options.
151
'
'
'Specify security translation specific options.
'
objSecurityTranslation.TranslationOption = admtTranslateRemove
objSecurityTranslation.TranslateFilesAndFolders = True
objSecurityTranslation.TranslateLocalGroups = True
objSecurityTranslation.TranslatePrinters = True
objSecurityTranslation.TranslateRegistry = True
objSecurityTranslation.TranslateShares = True
objSecurityTranslation.TranslateUserProfiles = False
objSecurityTranslation.TranslateUserRights = True
'
'Perform security translation on specified computer objects.
'
objSecurityTranslation.Translate admtData, _
Array("computer name1" ,"computer name2" )
152
Migrating Resources
Applies to: Active Directory Migration Tool 3.1 (ADMT 3.1) and ADMT 3.2
The process of migrating resources between Active Directory domains in different forests involves
completing the migration of the following:
Domain controllers
When you have successfully migrated all resource objects to the target domain, you can
decommission the source domain.
The following illustration shows the process for migrating resource objects between
Active Directory domains in different forests.
a workstation between domains, the SAM database is migrated along with the computer.
Accounts in the local SAM database (such as local groups) that are used to enable access to
resources always move with the computer. Therefore, they do not have to be migrated.
If a workstation has managed service accounts installed and those accounts have been
previously migrated, the Active Directory Migration Tool (ADMT) provides an option to reinstall the
migrated managed service account on the migrated computer and update Service Control
Manager. So that ADMT can perform this operation, the account performing the computer
migration needs permissions to modify the security descriptor of the migrated managed service
account.
Because the migration requires that workstations and member servers be restarted, it is important
to schedule the migration for a time when the server is not servicing requests.
Note
Restart workstations immediately after you join them to the target domain, by selecting a
low number (such as 1) for the RESTARTDELAY parameter. Resources that are not
restarted after migration are in an indeterminate state.
You can migrate workstations and member servers by using the Active Directory Migration Tool
(ADMT) snap-in, the ADMT command-line option, or a script.
To migrate workstations and member servers by using the ADMT snap-in
1.
On the computer in the target domain on which you installed ADMT, log on by using the ADMT resource
migration account.
2.
Use the Computer Account Migration Wizard by performing the steps in the following table.
154
Wizard page
Action
Domain Selection
Computer Selection
Click Browse.
In the Browse for Container dialog box, locate
the target domain Computers container or the
appropriate organizational unit (OU), and then
click OK.
Translate Objects
Click Add.
Computer Options
Wizard page
Action
3.
Review the results that are displayed on the screen for any errors. After the wizard completes, click View
Migration Log to see the list of computers, completion status, and the path to the log file for each
computer. If an error is reported for a computer, you will have to refer to the log file on that computer to
review any problems with local groups. The log file for each computer is named MigrationTASKID.log,
and it is stored in the Windows\ADMT\Logs\Agents folder.
4.
Open Active Directory Users and Computers, and verify that the workstations exist in the appropriate OU
in the target domain.
To migrate workstations and member servers by using the ADMT command-line option
1.
On the computer in the target domain on which ADMT installed, log on by using the ADMT resource
migration account.
2.
Computer
As an alternative, you can include parameters in an option file that is specified at the command
line, as follows:
ADMT COMPUTER /N "<computer_name1>" "<computer_name2>" /O:" <option_file>.txt"
The following table lists the common parameters that are used for workstation migration, along
with the command-line parameter and option file equivalents.
156
Parameters
Command-line syntax
<Source domain>
SD:"SOURCE_DOMAIN"
SourceDomain=
/SO:"SOURCE_OU"
SourceOU="SOURCE_OU
<Target domain>
/TD:"TARGET_DOMAIN"
TargetDomain=
/UALLMSA: YES
UpdateAllManagedServiceAc
/M NAME
UPDATEMSANAME=
1 NAME 2
Note
The /M parameter takes
precedence over the
/UALLMSA parameter.
/TO:"TARGET_OU"
TargetOU="TARGET_OU
/RDL:5
RestartDelay=5
/TOT:ADD
TranslationOption=ADD
/TUR:YES
TranslateUserRights=YES
/TLG:YES
TranslateLocalGroups=YES
3.
Review the results that appear on the screen for any errors. The migration log lists computers, completion
status, and the path to the log file for each computer. If an error is reported for a computer, you will have
to refer to the log file for that computer to review any problems with local groups. The log file for each
computer is named MigrationTASKID.log, and it is stored in the Windows\ADMT\Logs\Agents folder.
4.
Open Active Directory Users and Computers, and locate the target OU. Verify that the workstations exist
in the target OU.
To migrate workstations and member servers by using a script
Prepare a script that incorporates ADMT commands and options for migrating workstations and member
servers by using the following sample script. Copy the script to Notepad, and save the file with a .wsf file
name extension in the same folder as the AdmtConstants.vbs file.
<Job id="MigratingWorkstationsMemberServersBetweenForests" >
<Script language="VBScript"
src="AdmtConstants.vbs" />
157
Dim objMigration
Dim objComputerMigration
'
'Create instance of ADMT migration objects.
'
'
'Specify general migration options.
'
'
'Specify computer migration specific options.
'
objComputerMigration.RestartDelay = 1
objComputerMigration.TranslationOption = admtTranslateAdd
objComputerMigration.TranslateLocalGroups = True
objComputerMigration.TranslateUserRights = True
objComputerMigration.UpdateAllManagedServiceAccounts = True
'
'Migrate computer objects on specified computer objects.
'
158
objComputerMigration.Migrate admtData, _
Array("computer name1" ,"computer name2" )
On the computer in the target domain on which you installed ADMT, log on by using the ADMT resource
migration account.
2.
Use the Group Account Migration Wizard by performing the steps in the following table.
159
Wizard page
Action
Domain Selection
Group Selection
Group Options
User Account
Conflict Management
3.
When the wizard has finished running, click View Log. Review the migration log for any errors.
4.
Open Active Directory Users and Computers, locate the target organizational unit (OU), and then verify
that the shared local groups exist in the target domain OU.
To migrate domain and shared local groups by using a script
Prepare a script that incorporates ADMT commands and options for migrating domain and shared local
groups by using the following sample script. Copy the script to Notepad, and save the file with a .wsf file
name extension in the same folder as the AdmtConstants.vbs file.
<Job id=" MigratingDomainAndSharedLocalGroupsBetweenForests" >
<Script language="VBScript"
src="AdmtConstants.vbs" />
Dim objMigration
Dim objGroupMigration
'
'Create instance of ADMT migration objects.
'
'
'Specify general migration options.
'
'
161
objGroupMigration.MigrateSIDs = True
'
'Migrate specified group objects.
'
objGroupMigration.Migrate admtData, _
Array("local group name1" ,"local group name2" )
If the server is running Windows 2000 Server, you cannot install Active Directory or AD DS in the
target domain if the target domain is already at the Windows Server 2003 functional level. In this
case, you must upgrade the server to Windows Server 2003 before installing Active Directory or
AD DS.
The same steps are required to migrate an RODC as are required for a writeable domain
controller.
162
Transfer the administration of user accounts and group accounts from the source domain to the target
domain.
Ensure that at least two domain controllers continue to operate in the source domain until the resource
migration process is complete.
After you complete these steps, you can translate security on the member servers in the target
domain and decommission the source domain. The following illustration shows the process for
completing the migration of Active Directory domains between forests.
Translate security on member servers to clean up the access control lists (ACLs) of the
resources. After objects are migrated to the target domain, resources contain the ACL entries of
the source domain objects. If you are using security identifier (SID) history to provide access to
resources during the migration, the SIDs from the source domain remain in the ACLs so that
users can access resources while the migration is in progress. After the migration is complete, the
SIDs from the source domain are no longer needed. Use the Security Translation Wizard in the
Active Directory Migration Tool (ADMT) to replace the source domain SIDs with the target domain
SIDs.
You do not have to perform this procedure if you are not using SID history for resource access,
because you should have already run security translation in remove mode after the user
migration.
You can translate security on member servers by using the ADMT snap-in, the ADMT commandline option, or a script.
To translate security on member servers by using the ADMT snap-in
1.
On the computer in the target domain on which ADMT is installed, log on by using the ADMT account
migration account.
2.
Use the Security Translation Wizard by performing the steps in the following table.
164
Wizard page
Action
Domain Selection
Computer Selection
Translate Objects
Click Replace.
On the computer in the target domain on which ADMT is installed, log on by using the ADMT account
migration account.
2.
Security
As an alternative, you can include parameters in an option file that is specified at the command
line, as follows:
ADMT SECURITY /N "<computer_name1>" "<computer_name2>" /O "<option_file>.txt"
165
The following table lists the common parameters that are used for migrating user accounts,
along with the command-line parameter and option file equivalents.
3.
Parameters
Command-line syntax
<Source domain>
/SD:"SOURCE_DOMAIN"
SourceDomain=
<Target domain>
/TD:"TARGET_DOMAIN"
TargetDomain=
/TOT:Replace
TranslateOption=REPL
Review the results that are displayed on the screen for any errors. After the wizard completes, click View
Migration Log to see the list of computers, completion status, and the path to the log file for each
computer. If an error is reported for a computer, you will have to refer to the log file on that computer to
review any problems with local groups. The log file for each computer is named MigrationTASKID.log,
and it is stored in the Windows\ADMT\Logs\Agents folder.
To translate security on member servers by using a script
Prepare a script that incorporates ADMT commands and options for translating security on member
servers by using the following sample script. Copy the script to Notepad, and save the file with a .wsf file
name extension in the same folder as the AdmtConstants.vbs file.
<Job id=" TranslatingSecurityOnMemberServersBetweenForests" >
<Script language="VBScript"
src="AdmtConstants.vbs" />
Dim objMigration
Dim objSecurityTranslation
'
'Create instance of ADMT migration objects.
'
'
'Specify general migration options.
166
'
'
'Specify security translation specific options.
'
objSecurityTranslation.TranslationOption = admtTranslateReplace
objSecurityTranslation.TranslateFilesAndFolders = True
objSecurityTranslation.TranslateLocalGroups = True
objSecurityTranslation.TranslatePrinters = True
objSecurityTranslation.TranslateRegistry = True
objSecurityTranslation.TranslateShares = True
objSecurityTranslation.TranslateUserProfiles = False
objSecurityTranslation.TranslateUserRights = True
'
'Perform security translation on specified computer objects.
'
objSecurityTranslation.Translate admtData, _
Array("computer name1" ,"computer name2" )
167
Remove all trust relationships between the source domain and the target domain.
2.
Repurpose any remaining domain controllers in the source domain that you did not migrate to the target
domain.
3.
Disable all accounts that you created during the migration process, including those accounts to which you
assigned administrative permissions.
Note
When you decommission the source domain, shared local groups and local groups that
you have not translated by using the Security Translation Wizard display group
members as "account unknown." This is because member names from the source
domain do not resolve. Those group memberships still exist, however, and this does not
affect users. Do not delete "account unknown" entries because this disables the access
that is facilitated by security identifier (SID) history. Run the Security Translation Wizard
to remove these entries.
Replication traffic
168
If users are frequently reassigned to locations that are part of different domains, you might also
migrate objects between domains on a regular basis. The process for restructuring
Active Directory domains within a forest differs from the process for restructuring Active Directory
domains between forests. This process requires careful planning and testing.
If you frequently reassign users to different domains, you might also migrate objects between
domains on a regular basis. Restructuring Active Directory domains within a forest differs from
migration between forests, and it requires careful planning and testing.
Task
Reference
Note
This registry key does not need to be set for
migrating computers that run
Windows Vista SP1, Windows 7, or Windows
Server 2008 R2.
Registry path:
HKLM\System\CurrentControlSet\Services\Netlogon
169
Task
Reference
\Parameters
Registry value: AllowNT4Crypto
Type: REG_DWORD
Data: 1
Note
This registry setting corresponds to the Allow
cryptography algorithms compatible with
Windows NT 4.0 setting in Group Policy.
For any migration tasks that use agent deployment and
where Windows Firewall is in use, enable the File and
Printer Sharing exception. This can include migration for
the following situations:
Install ADMT.
Migrate Groups
170
Task
Reference
171
your Active Directory logical structure, in the following cases, you might also restructure domains
in your forest:
The process of restructuring Active Directory domains in a forest is similar to the process of
migrating accounts between domains. When you migrate accounts and resources between
domains, you migrate objects from the source domain to the target domain without
decommissioning the source domain. When you restructure Active Directory domains, you
eliminate the source domain from the forest after you complete the migration of all domain
objects.
Before you begin the process for restructuring Active Directory domains in a forest, ensure that
the source and target domains are operating at the minimum domain functional level that is
required for the version of ADMT that you are using. If you are using ADMT v3.1, the minimum
domain functional level is Windows 2000 native. If you are using ADMT v3.2, the minimum
domain functional level is Windows Server 2003.
After you complete the process for restructuring Active Directory domains in a forest, you can
decommission the source domain to help reduce overhead and simplify domain functional level
administration in your organization.
172
User accounts
Global groups are limited to members of the domain where the global group exists. Therefore, if
you migrate a user account to a new domain but you do not migrate the global groups to which
the user belongs, the user is no longer a valid member of those global groups and the user
cannot access resources that are based on membership in those global groups. Therefore, when
you are moving accounts between domains in a forest, it is necessary to move closed sets so that
users retain access to their resources.
173
Although built-in accounts (such as Administrators, Users, and Power Users) and well-known
accounts (such as Domain Admins and Domain Users) cannot be Active Directory Migration Tool
(ADMT) migration objects, migrating these groups in closed sets is not a common problem. Using
them in access control lists (ACLs) or membership in domain local groups is not an effective way
to assign resource permissions.
When you migrate users, ADMT makes the user a member of the domain users group in the
target domain. However, it does not maintain permissions for other built-in groups (such as
Server Operators and Backup Operators) or well-known groups (such as Domain Admins). If you
have used built-in or well-known groups to assign resource permissions, you must reassign those
permissions to a new domain local group before you begin the migration. Reassigning
permissions includes performing the following steps:
1.
2.
Create a new global group in the source domain that contains users who need access to the resource.
3.
4.
Run security translation by using a security identifier (SID) mapping file that maps the well-known
group to the new domain local group (created in the first step) on all resources that assign permissions
using well-known groups. For information about performing a security translation by using a SID
mapping file, see Translate Security by Using a SID Mapping File, later in this guide.
In small domain environments that have few global groups, you might be able to identify closed
sets of users and groups. If you can identify closed sets, you can migrate users and groups at the
same time. In a large domain environment, a user can belong to a number of global groups.
Therefore, it is difficult to identify and migrate only closed sets of users and groups. For this
reason, it is best to migrate groups before you migrate user accounts.
For example, User 1 belongs to global groups Global A and Global B and is a member of
Domain 1. If an administrator moves User 1 and Global A to Domain 2 in the same forest, these
accounts no longer exist in Domain 1. They exist only in Domain 2 in the same forest. Global B
group remains in Domain 1. This creates an open set, or a set that includes users and groups in
more than one domain. Because global groups can only contain members from the domain where
the global group exists, the membership of User 1 in Global B is no longer valid, and User 1 can
no longer access resources based on membership in Global B. Therefore, it is best to migrate
both global groups before you migrate User 1.
If you are migrating an open set of objects in an environment where the functional level for both
the source domain and the target domain is Windows 2000 native or higher, ADMT transforms the
global group into a universal group so that it can contain users from other domains and retain the
group membership. When the set becomes a closed set, ADMT changes the group back to a
global group. The benefit of this process is that ADMT ensures that all closed set problems are
resolved. However, replication of the global catalog is increased while the groups are universal
groups because membership is copied to the global catalog.
Note
174
If the functional level of the source domain is Windows 2000 mixed, ADMT cannot
transform the global group into a universal group because universal groups cannot exist
at that functional level. Even if the target domain is in native mode, however, users in
mixed mode domains would not get the SIDs of universal groups in their access tokens, if
the groups are from outside the domain. Therefore, ADMT creates a copy of the global
group in the target domain and adds all migrated users to the copy of that group. This
group has a new SID and no SID history. This method does not preserve access to
resources unless you run the ADMT Security Translation Wizard in Add mode to update
permissions, which delays and complicates the migration process. For this reason, we do
not recommend that you restructure domains that are operating at the Windows 2000
mixed domain functional level or the Windows Server 2003 interim domain functional
level.
SID history
SID history helps you to maintain user access to resources during the process of restructuring
Active Directory domains. When you migrate an object to another domain, the object is assigned
a new SID. Because you assign permissions to objects based on SIDs, when the SID changes,
the user loses access to that resource until you can reassign permissions. When you use ADMT
to migrate objects between domains in the same forest, the SID history is automatically retained.
In this way, the SID from the source domain remains as an attribute of the object after the object
is migrated to the target domain.
For example, an organization that is restructuring its Active Directory domains moves universal
and global groups from a source domain to the target domain before moving user accounts.
Because this is a migration within a forest and the functional level of the source domain is
Windows 2000 native, these groups cease to exist in the source domain and exist only in the
target domain. Because the SID history of both users and groups is migrated, the users continue
to have access to resources in the source domain based on their membership in a group that
exists in the target domain.
175
2.
3.
176
Identify the source domains from which you will migrate objects.
Identify and evaluate the organizational unit (OU) structure of the target domain where you will place
those objects.
177
178
To create a resource object assignment table, identify the source and target OU for each object
and note the physical location and role in the target domain. For a worksheet to assist you in
creating a resource object assignment table, see Resource Object Assignment Table
(DSSREER_2.doc) in the Job_Aids_Designing_and_Deploying_Directory_and_Security_Services
download of the Job Aids for Windows Server 2003 Deployment Kit
(http://go.microsoft.com/fwlink/?LinkId=14384).
The following illustration shows an example of a resource object assignment table.
179
Location
Global group
Active Directory
Universal group
Active Directory
Active Directory
Each type of group is migrated differently based on the groups physical location and its rules for
group membership. You can migrate universal groups and global groups by using the
Active Directory Migration Tool (ADMT). You can transform them into universal groups for the
duration of the migration, if you are not migrating closed sets. You can update computer local
group membership by using the Security Translation Wizard.
Each group type has different rules for membership, and each group type serves a different
purpose. This affects the order that the groups are migrated from the source to the target
domains. The following table summarizes the groups and their membership rules.
Group type
Universal groups
Global groups
181
Create a test user in the source domain. Include this test user with your migrations.
2.
Join that user to the appropriate global groups to enable resource access.
3.
Log on to the source domain as the test user, and verify that you can access resources as appropriate.
4.
After you migrate the user account, translate the user profile, and migrate the workstation of the user,
log on to the target domain as the test user, and verify that the user has retained all necessary access
and functionality. For example, you might test to verify that:
The user has access to all appropriate resources, such as file and print shares; access to services
such as messaging; and access to line-of-business (LOB) applications. It is especially important to
test access to internally developed applications that access database servers.
The user profile was successfully translated, and the user retains desktop settings, desktop
appearance, shortcuts, and access to the My Documents folder. Also, verify that applications
appear in and start from the Start menu.
You cannot migrate every user property when you migrate user accounts. For more
information about user properties that cannot be migrated, see Migrate User Accounts,
later in this guide.
After you migrate resources, log on as the test user in the target domain, and verify that you can
access resources as appropriate.
If any steps in the test process fail, identify the source of the problem, and determine whether you
can correct the problem before the object has to be accessible in the target domain. If you cannot
correct the problem before access to the object is required, roll back to your original configuration
to ensure access to the user or resource object. For more information about creating a rollback
plan, see Creating a Rollback Plan, later in this guide.
As part of your test plan, create a migration test matrix. Complete a test matrix for each step that
you complete in the migration process. For example, if you migrate 10 batches of users, complete
182
the test matrix 10 times, once for each batch that you migrate. If you migrate 10 member servers,
complete the test matrix for each of the 10 servers.
For a worksheet to assist you in creating a test matrix, see Migration Test Matrix
(DSSREER_3.doc) in the Job_Aids_Designing_and_Deploying_Directory_and_Security_Services
download of the Job Aids for Windows Server 2003 Deployment Kit
(http://go.microsoft.com/fwlink/?LinkId=14384).
The following illustration shows an example of a completed migration test matrix.
183
General information
Alert users to the fact that their user accounts are scheduled to be migrated to a new domain.
Point users to a Web page or internal resource where they can find additional information, and
view a migration schedule.
Inform users of their new domain name. Be sure to let them know that their account passwords
will not change. Let users know that the original domain account will be disabled immediately
following the migration, and the disabled account will be deleted after a specified period of time.
This is not needed if they log on with user principal names (UPNs).
Impact
Make sure that users understand that when their account is migrated, they might be unable to
access some resources, such as Web sites, shared folders, or resources that individuals in their
group or division do not widely use.
Provide information to users about whom to contact for assistance in regaining access to required
resources.
Premigration steps
Alert users to any steps that they need to complete before the migration process begins. For
example, they must decrypt files encrypted by means of Encrypting File System (EFS). Failure to
decrypt encrypted files will result in loss of access to encrypted files following the migration.
184
Users must also ensure that their computers are connected to the network when their account is
scheduled to be migrated.
Expected changes
Describe other changes that users can expect to experience following the migration, such as
changes in use of smart cards, secure e-mail, or instant messaging, if applicable.
Credentials necessary
Delegated Create, de
accounts, Create, de
and Modify the memb
user OU or the group
Note
Managed service accounts do not
preserve security identifier (SID)
185
Migration object
Credentials necessary
Delegated permission
local administrator on
is installed
Note
If the computer ha
account installed,
permission to upd
descriptor of the m
in the target doma
Profile
Delegated Create, de
accounts for the com
administrator on the co
installed
Note
Migration task
Account migrators
Resource migrators
Data readers
186
Users who are assigned the role of SQL Server sysadmin hold all ADMT database administration
roles. They have permissions to:
By default, the local Administrators group is assigned the role of sysadmin. This group can
perform all ADMT database functions.
Detach an existing database file from a previous version of ADMT and SQL Server
Remove all previous versions of ADMT by using Add or Remove Programs from Control Panel. If
you attempt to install ADMT v3.1 on a server that has a previous version of ADMT installed, you
receive an error, and the installation does not proceed. If necessary, you can import the database from
the previous version of ADMT (such as ADMT v2.0 or ADMT v3.0) into ADMT v3.1 during the
installation.
If you do not plan to use the default local database installation, ensure that another SQL Server 2000 or
SQL Server 2005 database installation is configured with an ADMT instance. For more information
about creating an ADMT instance on a SQL Server database, see Installing ADMT Using a
Preconfigured SQL Database.
188
Wizard Page
Action
Click Next.
Configuring Components
Database Selection
Wizard Page
Action
Summary
190
In Control Panel, use Add or Remove Programs to remove all versions of ADMT earlier than
ADMT v3.2.
Although ADMT v3.2 does not support an upgrade from a previous version of ADMT, you can
reuse an existing database from a previous ADMT installation, unless it is a database from
ADMT v2 or ADMT v1. For more information, see Reuse an existing ADMT database from
a previous installation.
Install or upgrade a server computer (preferably a member server) in either your source or target
domain environment as necessary to run Windows Server 2008 R2.
Although you can use ADMT v3.2 to migrate accounts and resources from Active Directory
environments that have a domain functional level of Windows Server 2003 or later, you can
install ADMT v3.2 only on a server running Windows Server 2008 R2.
In addition to running Windows Server 2008 R2, the server computer that you use to install
ADMT v3.2 must not be installed under the Server Core installation option or be running as a
read-only domain controller (RODC).
Configure a SQL Server database installation with an ADMT instance. You can either download and
install SQL Server Express locally or create a database instance for ADMT from an existing
SQL Server database.
For more information about installing SQL Server Express, see Install ADMT v3.2. For more
information about creating an ADMT instance on an existing SQL Server database, see
Install ADMT by Reconfiguring a Database Installation with Admtdb.exe.
2.
On the Welcome page, ensure that the recommendations are completed, and then click Next.
191
3.
On the License Agreement page, click I Agree, and then click Next.
4.
5.
If you chose a SQL Express installation and a database file ADMT.mdf is not in the default data location
%windir%\ADMT\Data, the Database Import page appears. Otherwise, ADMT Setup automatically
attaches to that database file, and the Summary page appears.
On the Database Import page, if you do not need to import data, click No, do not import data
from an existing database (Default). If you need to import data from a previous ADMT
installation, click Yes, import data from an existing ADMT v3.0 or ADMT v3.1 database, and
then, to navigate to the existing database file location, click Browse.
Before you can import the data from an existing database, you have to detach the database file
from SQL Server by using SQL Server commands. For more information, see Detach an
existing database file from a previous version of ADMT and SQL Server.
When you are finished, click Next.
6.
On the Summary page, review the results of the installation, and then click Finish.
For more information about this stored procedure call, see SQL Server documentation. For more
information about how to use SQL Server Management Studio to detach the database, see How
to: Detach a Database (SQL Server Management Studio (http://go.microsoft.com/fwlink/?
LinkId=183994).
192
Description
To see Help for all Admtdb.exe command-line options, at the command prompt, type admtdb /?.
193
If you began the migration by using a local SQL Server Express database and then configured a
remote instance of a SQL Server database, and you need to switch back to using a local
SQL Server Express database, complete the following procedure. In this case, the ADMT
database file is already attached to the SQL Express instance. Therefore, there is no need to
explicitly reattach it.
If you began the migration by using SQL Server and you want to switch to SQL Server Express,
see Reuse an existing ADMT database from a previous installation.
Membership in Administrators, or equivalent, is the minimum required to complete this
procedure. Review details about using the appropriate accounts and group memberships at Local
and Domain Default Groups (http://go.microsoft.com/fwlink/?LinkId=83477).
To reuse a local database after you configure a remote instance of a SQL Server
1.
2.
database
On the local computer, click Start, point to Administrative Tools, and then click Services.
In the Details pane, ensure that the service hosting the SQL Server Express instance is running and that
the Startup Type is set to Automatic. If you are using ADMT v3.1 and you had ADMT setup install
SQL Server Express, the service name is MSSQL$MS_ADMT.
If the service is not started or if it is not set to start automatically at system startup, click
Started, right-click the name of the service, and then click Properties.
3.
4.
5.
Close Services.
6.
Note
Membership in Administrators, or equivalent, is the minimum required to complete this
procedure. Review details about using the appropriate accounts and group memberships
at Local and Domain Default Groups (http://go.microsoft.com/fwlink/?LinkId=83477).
To use an existing (detached) ADMT database with a local SQL Server instance
1.
On the local computer, click Start, point to Administrative Tools, and then click Services.
2.
In the details pane, ensure that the service hosting the SQL Server Express instance is running and that
the Startup Type is set to Automatic. If you are using ADMT v3.1 and you had ADMT setup install
SQL Server Express, the service name is MSSQL$MS_ADMT.
If the service is not started or if it is not set to start automatically at system startup, click
Started, right-click the name of the service, and then click Properties.
3.
4.
5.
Close Services.
6.
You can now use the existing ADMT database with the local SQL Server instance. It is not
necessary to run the ADMT installation wizard again. ADMT installation can be run only once.
You can perform any subsequent database configuration changes by using the admtdb.exe and
admt config setdatabase commands.
Wizard sends an agent to a specified computer and identifies (but does not migrate) all the
services on the computer that are running in the context of a user account. The third step, which
can occur later in the migration process, is to migrate the accounts when other user accounts are
migrated with the User Account Migration Wizard.
The Service Account Migration Wizard checks every service on a computer to identify services
that run in the context of a user account. You can create a security hole during the migration of
service accounts if someone who is not a service administrator enters an account with
administrative permissions in the source domain but uses an invalid password on their computer
to start the service. The service will not start before the account migrationbecause the
password is not correctbut it will work after migration because ADMT resets the password of
the service account and configures all services that are using that service account with the new
password.
To eliminate this possible security problem, it is important to include in the Service Account
Migration Wizard only those servers that are managed by trusted administrators. Do not use the
Service Account Migration Wizard to detect service accounts on computers that are not managed
by trusted administrators, such as workstations.
If you do not identify and transition a trusted computer that therefore does not get its service
account updated, you will have to manually set the new password that ADMT creates. To do this,
obtain the password from the Password.txt file, and then manually enter that account and
password information for the service on the computer that did not get transitioned.
When the accounts that the Service Account Migration Wizard identifies in the ADMT database as
running in the context of a user account are migrated to the target domain, ADMT grants each
account the right to log on as a service.
To run the service account migration wizard
1.
2.
196
Wizard page
Action
Domain Selection
Update Information
Agent Dialog
The wizard connects to the selected computers, and then sends an agent to check every
service on the remote computers. The Service Account Information page lists the services that
197
are running in the context of a user account and the name of that user account. ADMT notes in
its database that these user accounts have to be migrated as service accounts. If you do not
want a user account to be migrated as a service account, select the account, and then click
Skip/Include to change the status from Include to Skip.
3.
You use Update SCM to update the Service Control Manager with the new information. Unless you have
a failure in reaching a computer to update the service, the Update SCM button is not available. If you
have a problem updating a service account after the account was identified and migrated, ensure that the
computer that you are trying to reach is available, and then restart the Service Account Migration Wizard.
In the wizard, click Update SCM to try to update the service. If you ran the Service Account Migration
Wizard previously and the Update SCM button is not available, examine the ADMT log files to
determine the cause of the problem. After you correct the problem and the agent can connect successfully,
the Update SCM button becomes available.
To identify service accounts by using the ADMT command-line option
1.
On the computer in the target domain on which ADMT is installed, log on by using the ADMT account
migration account.
2.
At the command line, type the following command, and then press ENTER:
ADMT SERVICE /N "<computer_name1>" "<computer_name2>" /SD:"<source_domain>" /TD:"
<target_domain>"
The following table lists the common parameters that are used for the identification of service
accounts, along with the command-line parameter and option file equivalents.
3.
Parameters
Command-line syntax
<Source domain>
/SD:"SOURCE_DOMAIN"
SourceDomain=
<Target domain>
/TD:"TARGET_DOMAIN"
TargetDomain=
Review the results that appear on the screen for any errors.
To identify service accounts by using a script
Create a script that incorporates ADMT commands and options for identifying service accounts by using
the following sample script. Copy the script to Notepad, and save the file with a .wsf file name extension
in the same folder as the AdmtConstants.vbs file.
198
src="AdmtConstants.vbs" />
Dim objMigration
Dim objServiceAccountEnumeration
'
'Create instance of ADMT migration objects.
'
'
'Specify general migration options.
'
'
'Enumerate service accounts on specified computers.
'
objServiceAccountEnumeration.Enumerate admtData, _
Array("computer name1" ,"computer name2" )
199
200
Migrate Groups
Applies to: Active Directory Migration Tool 3.1 (ADMT 3.1) and ADMT 3.2
To protect your system against the problem of open sets when you restructure Active Directory
domains within a forest, migrate groups before you migrate the user accounts that are members
of those groups. If you migrate groups simultaneously with migrating users, you might not migrate
nested groups, which creates an open set.
In addition, follow these guidelines for migrating groups:
Migrate domain local groups when you migrate the resources (domain controllers and member servers)
on which they are used to assign permissions.
You can choose to migrate computer local groups when you migrate the computer later in the
restructure process.
201
On the computer in the target domain on which ADMT is installed, log on by using the ADMT account
migration account.
Use the Group Account Migration Wizard by performing the steps in the following table.
202
Wizard page
Action
Domain Selection
Group Options
Conflict Management
On the computer in the target domain on which ADMT is installed, log on by using the ADMT account
migration account.
Note
When you start a group migration with sIDHistory migration from the command line, the
command must be run on a domain controller in the target domain.
2.
Group
As an alternative, you can include parameters in an option file that is specified at the command
line as follows:
ADMT GROUP /N "<group_name1>" "<group_name2>" /O: "<option_file>.txt"
The following table lists the parameters that are required for migrating universal groups, the
command-line parameters, and option file equivalents. For a complete list of all available
parameters, see ADMT v3.1 Help.
Parameters
Command-line syntax
Intra-forest
/IF:YES
IntraForest=YES
<Target domain>
/TD:"TARGET_DOMAIN"
TargetDomain=
/TO:"TARGET_OU"
TargetOU=
Conflict management
/CO:IGNORE
(default)
ConflictOptions=IGN
3.
Review the results that are displayed on the screen for any errors.
4.
Open Active Directory Users and Computers, and then locate the target domain OU. Verify that the
universal groups exist in the target domain OU.
To migrate universal groups by using a script
Use the following sample to prepare a script that incorporates ADMT commands and options for
migrating groups within a forest. Copy the script to Notepad, and save the file with a .wsf file name
extension in the same folder as the AdmtConstants.vbs file.
Note
When you start a group migration with sIDHistory migration from a script, you must run
the script on a domain controller in the target domain.
204
src="AdmtConstants.vbs" />
Dim objMigration
Dim objGroupMigration
'
'Create instance of ADMT migration objects.
'
'
'Specify general migration options.
'
objMigration.IntraForest = True
objMigration.SourceDomain = "source domain"
objMigration.SourceOu = "source container"
objMigration.TargetDomain = "target domain"
objMigration.TargetOu = "target container"
'
'Migrate specified group objects.
'
205
</Job>
206
You can migrate global groups by using the ADMT snap-in, the ADMT command-line option, or a
script.
To migrate global groups by using the ADMT snap-in
1.
On the computer in the target domain on which ADMT is installed, log on by using the ADMT account
migration account.
2.
Use the Group Account Migration Wizard by performing the steps in the following table.
207
Wizard page
Action
Domain Selection
Group Selection
Group Options
Conflict Management
208
3.
After the wizard runs, click View Log, and review the migration log for any errors.
4.
Open Active Directory Users and Computers, and then locate the target domain OU. Verify that the global
groups exist in the target domain OU.
To migrate global groups by using the ADMT command-line option
1.
On the computer in the target domain on which ADMT is installed, log on by using the ADMT account
migration account.
Note
When you start a group migration with sIDHistory migration from the command line, you
must run the command on a domain controller in the target domain.
2.
Group
As an alternative, you can include parameters in an option file that is specified at the command
line, as follows:
ADMT GROUP /N "<group_name1>" "<group_name2>" /O: "<option_file>.txt"
The following table lists the parameters that are required for migrating global groups, the
command-line parameters, and option file equivalents.
Parameters
Command-line syntax
Intra-forest
/IF:YES
IntraForest=YES
<Target domain>
/TD:"TARGET_DOMAIN"
TargetDomain=
/TO:"TARGET_OU"
TargetOU=
Conflict management
/CO:IGNORE
(default)
ConflictOptions=IGN
3.
Review the results that are displayed on the screen for any errors.
4.
Open Active Directory Users and Computers, and then locate the target domain OU. Verify that the global
groups exist in the target domain OU.
To migrate global groups by using a script
1.
Use a script that incorporates ADMT commands and options for migrating universal groups. For more
information about migrating universal groups, see Migrate Universal Groups, earlier in this guide.
Note
209
When you start a group migration with sIDHistory migration from a script, the script
must be run on a domain controller in the target domain.
2.
After completing the global group migration by using a script, view the migration log. The migration.log
file is stored in the folder where you installed ADMT, typically Windows\ADMT\Logs.
Note
Because universal groups are replicated to the global catalog, converting global groups
to universal groups can affect replication traffic. When the forest is operating at the
Windows Server 2003 or Windows Server 2008 functional level, this impact is reduced
because only changes to the universal group membership are replicated. However, if
the forest is not operating at the Windows Server 2003 or Windows Server 2008
functional level, the entire group membership replicates every time that the universal
group membership changes.
On the computer in the target domain on which ADMT is installed, log on by using the ADMT account
migration account.
Use the User Account Migration Wizard by performing the steps in the following table.
210
Wizard page
Action
Domain Selection
User Selection
User Options
Wizard page
Action
A Migration Progress dialog box updates you on the status of the migration. During this time,
ADMT moves the accounts to the target domain, generates a new password for the accounts,
assigns the accounts the right to log on as a service, and provides this new information to the
services that use the accounts. When the status is listed as Completed in the Migration
Progress dialog box, you can continue with the rest of the intraforest migration.
Before the migration of the service accounts is completed, users might experience interruptions
when they use the services. This is because, until the service is restarted, it still uses the
account that has been migrated. For any services that continually use credentials, such as
search services, manually restart the services to ensure optimal results.
To migrate service accounts by using the ADMT command-line option
1.
On the computer in the target domain on which ADMT is installed, log on by using the ADMT account
migration account.
2.
At the command line, type the following command, and then press ENTER:
ADMT USER /N "<server_name1>" "<server_name2>" /IF:YES /SD:" <source_domain>" /TD:"
<target_domain>" /TO:" <target_OU>" /MSA:YES
Where <Server_name1> and <Server_name2> are the names of servers in the source domain that
run service accounts. As an alternative, you can include parameters in an option file that is
specified at the command line, as follows:
ADMT USER /N "<server_name1>" "<server_name2>" /O: "<option_file>.txt"
The following table lists the parameters that are required for migrating service accounts, the
command-line syntax, and option file equivalents.
212
Parameters
Command-line syntax
Intra-forest
/IF:YES
IntraForest=YES
<Target domain>
/TD:"TARGET_DOMAIN"
TargetDomain=
/TO:"TARGET_OU"
TargetOU=
/MSA:YES
MigrateServiceAccoun
/UUR:YES
UpdateUserRights=YES
/CO:IGNORE
(default)
ConflictOptions=IGNO
3.
Review the results that are displayed on the screen for any errors.
4.
Open Active Directory Users and Computers, and locate the target domain OU. Verify that the service
accounts exist in the target domain OU.
To migrate service accounts by using a script
Use the following listing to prepare a script that incorporates ADMT commands and options for migrating
service accounts. Copy the script to Notepad, and save the file with a .wsf file name extension in the same
folder as the AdmtConstants.vbs file.
<Job id=" MigratingServiceAccountsWithinForest" >
<Script language="VBScript"
src="AdmtConstants.vbs" />
Dim objMigration
Dim objUserMigration
'
'Create instance of ADMT migration objects.
'
'
213
objMigration.IntraForest = True
objMigration.SourceDomain = "source domain"
objMigration.SourceOu = "source container"
objMigration.TargetDomain = "target domain"
objMigration.TargetOu = "target container"
'
'Specify user migration specific options.
'
objUserMigration.UpdateUserRights = True
objUserMigration.MigrateServiceAccounts = True
'
'Migrate specified service accounts.
'
objUserMigration.Migrate admtData, _
Array("service account name1", "service account name2" )
The process for identifying and migrating managed service accounts using ADMT v3.2 involves
two steps:
1.
Use the Managed Service Account Migration Wizard or admt managedserviceaccount command line
tool to migrate managed service account objects to the target domain, as explained in this topic.
2.
Use the Computer Migration Wizard or admt computer command line tool to migrate the computers
that host the managed service accounts. For more information about migrating computers as part of an
interforest migration, see Remigrating User Accounts and Migrating Workstations in Batches. For
more information about migrating computers as part of an intraforest migration, see Migrate
Workstations and Member Servers.
The managed service accounts that were migrated in the previous step and that were
originally installed on the migrated computers are identified during the computer migration.
After the computer migration is complete, the managed service accounts are re-installed on
the computer in the target domain (unless you request to skip them). If you have run security
translation on the member servers that have resources that grant permission to the managed
service accounts, the accounts have the same permissions for resource access in the target
domain as they had in the source domain.
Important
If you are migrating managed service accounts between domains within the same
forest, run security translation on the member servers in the source domain that have
resources that grant permission to the managed service accounts. Security
translation is not normally necessary during an intraforest migration because a SID is
moved with an account. But managed service accounts that are migrated between
domains in the same forest are copied. A new account is created in the target domain
and the account properties (excluding SID) are copied from the source domain.
Therefore, you need to run security translation.
If the resources in the source domain that grant permission to a managed service
account are hosted on the same computer as the managed service account, then you
should select security translation on the appropriate resources (Files and folders,
Local groups, and so on) on the Translate Objects page of the Computer Migration
Wizard. If the resources are on other computers that are not being migrated, then you
need to run the Security Translation Wizard on those computers and on the Security
Translation Options page, select Previously migrated objects or explicitly provide
the MSA accounts in a SID mapping file. For more information about translation
security, see Translating Security on Your Member Servers.
To migrate managed service accounts by using the ADMT snap-in
1.
On the computer in the target domain on which ADMT is installed, log on by using the ADMT account
migration account.
2.
In the ADMT snap-in, click Action, and then click Managed Service Account Migration Wizard.
215
3.
Complete the Managed Service Account Migration Wizard by using the information in the following
table.
216
Wizard page
Action
Domain Selection
Wizard page
Action
Or
Click Read objects from an include file, and
then click Next. Type the location of the include
file, and then click Next.
Organizational Unit Selection
4.
When the wizard has finished running, click View Log, and then review the migration log for any errors.
5.
Start Active Directory Users and Computers, and then verify that the managed server accounts exist in the
appropriate OU in the target domain.
To migrate managed service accounts by using the ADMT command-line option
1.
On the computer in the target domain on which ADMT is installed, log on by using the ADMT account
migration account.
2.
At the command line, type the following command, and then press ENTER:
ADMT MANAGEDSERVICEACCOUNT /N "<managed service account1_name>" "<managed service
account2_name>" /IF:NO /SD:"<source_domain>" /TD:"<target_domain>" /UUR:YES /FGM:YES
218
/MSS:YES
service account2_name>
As an alternative, you can include parameters in an option file that is specified at the command
line as follows:
ADMT MANAGEDSERVICEACCOUNT /N "<managed service account1_name>" "<managed service
account2_name>" /O:"<option_file>.txt"
The following table lists the common parameters that are used for the migrating managed
service accounts, along with the command-line parameter and option file equivalents.
Values
Command-line syntax
Interforest migration
/IF:No
Intraforest=No
<Source domain>
/SD:"SOURCE_DOMAIN"
SourceDomain=
<Target domain>
/TD:"TARGET_DOMAIN"
TargetDomain=
/UUR:Yes
UpdateUserRights=
/FGM:Yes
FixGroupMembershi
/MSS:Yes
MigrateSIDs=Yes
Note
You can migrate SIDs for
managed service accounts only
between forests. An error is
returned if you use this
parameter during an intraforest
migration.
3.
Review the results that are displayed on the screen for any errors.
For managed service accounts that are hosted on member computers in the source domain, you
can include the member computer when you perform computer migration and the managed
service account will be installed on the member computer in the target domain after the computer
is migrated.
into smaller batches and migrate each of the smaller batches individually. You can group the
users in any way that you prefer.
You cannot migrate every user property when you migrate user accounts. For example, data that
is protected by the Data Protection API (DPAPI) is not migrated. DPAPI helps protect the following
items:
Private keys that are associated with EFS, Secure/Multipurpose Internet Mail Extensions (S/MIME),
and other certificates
For this reason, it is important to test user migrations. Use your test migration account to identify
any properties that did not migrate, and update user configurations in the target domain
accordingly.
If you are using Group Policy objects to manage software installation, remember that some
Windows Installer files require access to the original source for certain operations, such as repair
and uninstall. The administrator must reassign permissions to the software distribution point to
provide access to any account.
To retain software distribution access, perform these tasks:
1.
2.
If you are migrating accounts, groups, or computers by using the scripting option and you also
want to migrate OUs, modify your script to use the admtDomain option. Instead of using the
220
admtData or admtFile option, you must use the admtDomain option with admtRecurse and
admtMaintainHierarchy, as follows:
objUserMigration.Migrate admtDomain + admtRecurse + admtMaintainHierarchy
Migrate Accounts
Applies to: Active Directory Migration Tool 3.1 (ADMT 3.1) and ADMT 3.2
You can migrate each batch of user accounts by using the Active Directory Migration Tool (ADMT)
snap-in, the ADMT command-line option, or a script. If you are migrating user accounts that have
the authentication mechanism assurance enabled, use an include file. In the include file, specify
the original user principal name (UPNs) from the source domain as the target UPNs to keep the
authentication mechanism assurance working. For more information about using an include file,
see Use an Include File.
To migrate user accounts by using the ADMT snap-in
On the computer in the target domain on which ADMT is installed, log on by using the ADMT account
migration account.
Use the User Account Migration Wizard by performing the steps in the following table.
221
Wizard page
Action
Domain Selection
User Selection
User Options
Wizard page
Action
After you click Finish in the User Account Migration Wizard, the Migration Progress dialog box
appears. After the status changes to Completed, view the migration log to determine whether any
errors occurred in the migration process. In the Migration Progress dialog box, click Close.
The migrated user accounts can log on only to the target domain, and they are prompted to change
the password the first time that they log on to the target domain.
To migrate the user accounts by using the ADMT command-line option
1.
On the computer in the target domain on which ADMT is installed, log on by using the ADMT account
migration account.
Note
When you start a user migration with sIDHistory migration from the command line, you
must run the command on a domain controller in the target domain.
2.
User
As an alternative, you can include parameters in an option file that is specified on the command
line, as follows:
ADMT USER /N "<user_name1>" "<user_name2>" /O "<option_file>.txt"
The following table lists the parameters that are required for migrating user accounts, the
command-line parameters, and option file equivalents.
223
Parameters
Command-line syntax
Intraforest
/IF:YES
IntraForest=YES
<Source domain>
/SD:"SOURCE_DOMAIN"
SourceDomain=
/SO:"SOURCE_OU"
SourceOU=
<Target domain>
/TD:"TARGET_DOMAIN"
TargetDomain=
/TO:"TARGET_OU"
TargetOU=
Conflict management
/CO:IGNORE
/TRP:YES
/UUR:YES
(default)
(default)
ConflictOptions=IGNO
TranslateRoamingProf
UpdateUserRights=YES
3.
Review the results that appear on the screen for any errors.
4.
Open Active Directory Users and Computers, and then locate the target domain OU. Verify that the users
exist in the target domain OU.
To migrate user accounts by using a script
Note
When you start a user migration with sIDHistory migration from a script, the script must
be run on a domain controller in the target domain.
Use the following sample to prepare a script that incorporates ADMT commands and options for
migrating user accounts within a forest. Copy the script to Notepad, and save the file with a .wsf
file name extension in the same folder as the AdmtConstants.vbs file.
<Job id=" MigratingUserAccountsWithinForest" >
<Script language="VBScript"
src="AdmtConstants.vbs" />
Dim objMigration
Dim objUserMigration
'
'Create instance of ADMT migration objects.
'
224
'
'Specify general migration options.
'
objMigration.IntraForest = True
objMigration.SourceDomain = "source domain"
objMigration.SourceOu = "source container"
objMigration.TargetDomain = "target domain"
objMigration.TargetOu = "target container"
'
'Specify user migration specific options.
'
objUserMigration.TranslateRoamingProfile = True
objUserMigration.UpdateUserRights = True
objUserMigration.FixGroupMembership = True
objUserMigration.MigrateServiceAccounts = False
'
'Migrate specified user objects.
'
225
On the computer in the target domain on which ADMT is installed, log on by using the ADMT account
migration account.
2.
In the Active Directory Migration Tool (ADMT) snap-in, click Action, and then click Security
Translation Wizard.
3.
Complete the Security Translation Wizard by using the information in the following table.
226
Wizard page
Action
Domain Selection
Computer Selection
Translate Objects
Click Replace.
On the computer in the target domain on which ADMT is installed, log on by using the ADMT account
migration account.
2.
Security
227
<target_domain>"
/TOT:REPLACE /TUP:YES
As an alternative, you can include parameters in an option file that is specified at the command
line, as follows:
ADMT SECURITY /N "<computer_name1>" "<computer_name2>" /O "option_file.txt "
The following table lists the parameters that are required for translating local user profiles,
command-line parameters, and option file equivalents.
3.
Parameters
Command-line syntax
Intraforest
/IF:YES
IntraForest=YES
<Source domain>
/SD:"SOURCE_DOMAIN"
SourceDomain=
<Target domain>
/TD:"TARGET_DOMAIN"
TargetDomain=
<Target domain>
/TOT:REPLACE
TranslateOption=REPL
/TUP:YES
TranslateUserProfile
Review the results that appear in the migration log for any errors.
To translate local user profiles by using a script
Use the following sample to prepare a script that incorporates ADMT commands and options for
translating local user profiles. Copy the script to Notepad, and save the file with a .wsf file name
extension in the same folder as the AdmtConstants.vbs file.
<Job id=" TranslatingLocalProfilesWithinForest" >
<Script language="VBScript"
src="AdmtConstants.vbs" />
Dim objMigration
Dim objSecurityTranslation
'
'Create instance of ADMT migration objects.
'
228
'
'Specify general migration options.
'
objMigration.IntraForest = True
objMigration.SourceDomain = "source domain"
objMigration.TargetDomain = "target domain"
'
'Specify security translation specific options.
'
objSecurityTranslation.TranslationOption = admtTranslateReplace
objSecurityTranslation.TranslateUserProfiles = True
'
'Perform security translation on specified computer objects.
'
objSecurityTranslation.Translate admtData, _
Array("computer name1" ,"computer name2" )
229
Migrate workstations and member servers from the source domain to the target domain. When
you migrate computers, the changes do not take effect until the computer is restarted. Restart the
computers that you are migrating as soon as possible to complete the migration process.
Note
Restart member workstations and servers immediately after you join them to the target
domain by selecting a low number for the RESTARTDELAY parameter. Resources that are
not restarted after migration are in an indeterminate state.
Firewalls, such as Windows Firewall in Windows XP Service Pack 2 (SP 2), can prevent the
Active Directory Migration Tool (ADMT) computer account migration from completing. Thoroughly
test your computer migration in a lab environment to uncover any potential issues before you
perform the migration in the production environment. For more information about configuring
Windows Firewall, see Some programs seem to stop working after you install
Windows XP Service Pack 2 (http://go.microsoft.com/fwlink/?LinkId=76705) and Service overview
and network port requirements for the Windows Server system (http://go.microsoft.com/fwlink/?
LinkId=58432).
Computer accounts are treated differently than user and group accounts during a migration
between domains in an Active Directory forest. Where user and group accounts in the source
domain are deleted during an intraforest migration, computer accounts are left enabled in the
source domain, and a new computer account is created in the target domain.
This makes it possible for you to roll back the computer migration, if necessary. After the
migration is complete and your testing verifies that the computer is functioning as expected, you
can safely delete the computer account in the source domain.
If a workstation has managed service accounts installed and those accounts have been
previously migrated, ADMT provides an option to reinstall the migrated managed service account
on the migrated computer and update Service Control Manager. So that ADMT can perform this
operation, the account performing the computer migration needs permissions to modify the
security descriptor of the migrated managed service account.
You can migrate workstations and member servers by using the ADMT snap-in, the ADMT
command-line option, or a script.
To migrate workstations and member servers by using the ADMT snap-in
1.
On the computer in the target domain where ADMT is installed, log on by using a user account that is a
member of the ADMT resource migration group.
2.
Use the Computer Account Migration Wizard by performing the steps in the following table.
230
Wizard page
Action
Domain Selection
Computer Selection
Click Browse.
In the Browse for Container dialog box, click
the organizational unit (OU) in the target
domain to which the computers are migrating,
and then click OK.
Translate Objects
Click Replace.
231
Wizard page
Action
3.
Computer Options
Conflict Management
Review the results that are displayed on the screen for any errors. After the wizard completes, click View
log to see the list of computers, completion status, and the path to the log file for each computer. If an
error is reported for a computer, you will have to refer to the log file on that computer to review any
problems with local groups. The log file for each computer is named MigrationTASKID.log, and it is
stored in the Windows\ADMT\Logs\Agents folder.
To migrate workstations and member servers by using the ADMT command-line option
1.
On the computer in the target domain where ADMT is installed, log on by using a user account that is a
member of the ADMT resource migration group.
2.
Computer
As an alternative, you can include parameters in an option file that is specified at the command
line, as follows:
232
The following table lists the parameters that are required for workstation and member server
migration, the command-line parameters, and option file equivalents.
Parameters
Command-line syntax
Intraforest
/IF:YES
IntraForest=YES
<Source domain>
/SD:"SOURCE_DOMAIN"
SourceDomain=
<Target domain>
/TD:"TARGET_DOMAIN"
TargetDomain=
UpdateMSAName=
NAME
Note
The /M parameter takes
precedence over the
/UALLMSA parameter.
Update all managed service accounts
/UALLMSA: YES
UpdateAllManagedServiceA
/M NAME
UPDATEMSANAME=
1 NAME 2
Note
The /M parameter takes
precedence over the
/UALLMSA parameter.
<Target OU> location
/TO:"TARGET_OU"
TargetOU="TARGET_OU
/RDL:5
RestartDelay=5
Conflict management
/CO:IGNORE
/TOT:ADD
TranslationOption=YES
/TUR:YES
TranslateUserRights=YES
/TLG:YES
TranslateLocalGroups=YES
(default)
ConflictOptions=IGNORE
3.
Review the results that appear on the screen for any errors. The migration log lists computers, completion
status, and the path to the log file for each computer. If an error is reported for a computer, you will have
to refer to the log file for that computer to review any problems with local groups. The log file for each
computer is named MigrationTASKID.log, and it is stored in the Windows\ADMT\Logs\Agents folder.
4.
Open Active Directory Users and Computers, and then locate the target domain OU. Verify that the
workstations and member servers exist in the target domain OU.
To migrate workstations and member servers by using a script
233
Use the following listing to prepare a script that incorporates ADMT commands and options for migrating
workstations and member servers within a forest. Copy the script to Notepad, and save the file with a .wsf
file name extension in the same folder as the AdmtConstants.vbs file.
<Job id=" MigratingWorkstationsMemberServersWithinForest" >
<Script language="VBScript"
src="AdmtConstants.vbs" />
Dim objMigration
Dim objComputerMigration
'
'Create instance of ADMT migration objects.
'
'
'Specify general migration options.
'
objMigration.IntraForest = True
objMigration.SourceDomain = "source domain"
objMigration.SourceOu = "Computers"
objMigration.TargetDomain = "target domain"
objMigration.TargetOu = "Computers"
'
'Specify computer migration specific options.
'
objComputerMigration.TranslationOption = admtTranslateAdd
objComputerMigration.TranslateLocalGroups = True
234
objComputerMigration.TranslateUserRights = True
objComputerMigration.UpdateAllManagedServiceAccounts = True
objComputerMigration.RestartDelay = 1
'
'Migrate computer objects on specified computer objects.
'
objComputerMigration.Migrate admtData, _
Array("computer name1" ,"computer name2")
On the computer in the target domain on which ADMT is installed, log on by using the ADMT account
migration account.
Use the Group Account Migration Wizard by following the steps in the following table.
235
Wizard page
Action
Domain Selection
Group Selection
Group Options
Naming Conflicts
236
On the computer in the target domain on which ADMT is installed, log on by using the ADMT account
migration account.
2.
Group
As an alternative, you can include parameters in an option file that is specified at the command
line, as follows:
ADMT GROUP /N "<group_name1>" "<group_name2>" /O: "<option_file>.txt"
The following table lists the parameters that are required for migrating domain local groups, the
command-line parameters, and option file equivalents. For a complete list of all available
parameters, see ADMT v3.1 Help.
Parameters
Command-line syntax
Intra-forest
/IF:YES
IntraForest=YES
<Target domain>
/TD:"TARGET_DOMAIN"
TargetDomain=
/TO:"TARGET_OU"
TargetOU=
Conflict management
/CO:IGNORE
(default)
ConflictOptions=IGN
3.
Review the results that are displayed on the screen for any errors.
4.
Open Active Directory Users and Computers, and then locate the target domain OU. Verify that the
domain local groups exist in the target domain OU.
To migrate domain local groups by using a script
Use a script that incorporates ADMT commands and options for migrating domain local groups. You can
use the same script that you used to migrate universal groups. For more information about migrating
universal groups, see Migrate Universal Groups, earlier in this guide.
237
238
When you perform interforest migrations, you can choose to log the attributes for each user,
group, and computer object that is migrated. This is called verbose logging, and you do it with the
admt config logging command.
For more information and examples of commands related to accessing ADMT log files, search for
"admt config logging" or "admt task" in the ADMT Help.
On the computer in the target domain on which ADMT is installed, log on by using the ADMT account
migration account.
Use the Security Translation Wizard by performing the steps in the following table.
241
Wizard page
Action
Domain Selection
Computer Selection
Translate Objects
Click Replace.
On the computer in the target domain on which ADMT is installed, log on by using the ADMT account
242
migration account.
2.
At the command line, type the following command, and then press ENTER:
ADMT Security /N "<computer_name1>" "<computer_name2>" /SD:" <source_domain>" /TD:"
<target_domain>"
Where <Computer_name1> and <computer_name2> are the names of computers for which you want
to translate security.
As an alternative, you can include parameters in an option file that is specified at the command
line, as follows:
ADMT Security /N "<computer_name1>" "<computer_name2>" /O:" <option_file>.txt"
The following table lists the common parameters that are used to translate security on member
servers, along with the command-line parameter and option file equivalents.
3.
Parameters
Command-line syntax
<Source domain>
/SD:"SOURCE_DOMAIN"
SourceDomain=
<Target domain>
/TD:"TARGET_DOMAIN"
TargetDomain=
Review the results that are displayed on the screen for any errors.
To translate security on member servers by using a script
Use the following sample to prepare a script that incorporates ADMT commands and options to translate
security on member servers. Copy the script to Notepad, and save the file with a .wsf file name extension
in the same folder as the AdmtConstants.vbs file.
<Job id=" TranslatingSecurityOnMemberServersWithinForest" >
<Script language="VBScript"
src="AdmtConstants.vbs" />
Dim objMigration
Dim objSecurityTranslation
'
'Create instance of ADMT migration objects.
'
243
'
'Specify general migration options.
'
objMigration.IntraForest = True
objMigration.SourceDomain = "source domain"
objMigration.TargetDomain = "target domain"
objMigration.TargetOu = "Computers"
'
'Specify security translation specific options.
'
objSecurityTranslation.TranslationOption = admtTranslateReplace
objSecurityTranslation.TranslateFilesAndFolders = True
objSecurityTranslation.TranslateLocalGroups = True
objSecurityTranslation.TranslatePrinters = True
objSecurityTranslation.TranslateRegistry = True
objSecurityTranslation.TranslateShares = True
objSecurityTranslation.TranslateUserProfiles = False
objSecurityTranslation.TranslateUserRights = True
'
'Perform security translation on specified computer objects.
'
objSecurityTranslation.Translate admtData, _
Array("computer name1" ,"computer name2" )
244
</Script>
</Job>
245
The post-migration team of Contoso Corporation starts the post-migration tasks during the first
week of the migration. The members of the team examine the migration log after the first group of
migrations is completed on the first day. They analyze the migration log and define the action that
is required to migrate any accounts for which they find errors. This way, the migration team can
continue the migration without interruption.
During the second week of the migration process, the deployment team verifies that global
groups have returned from universal group to global group status after the migration of users has
completed. After the member servers are migrated, the deployment team runs the Security
Translation Wizard to remove the source domain security identifiers (SIDs) from the access
control lists (ACLs) of the member servers. Finally, the members of the deployment team
decommission the Africa domain at the end of the second week by removing Active Directory or
AD DS from the domain controllers in the Africa domain. They then migrate the domain
controllers to the EMEA domain as member servers.
You can also specify a preferred domain controller by using the admt config command-line option.
You must configure source and target domain controllers independently. After you configure a
preferred domain controller, ADMT determines its validity and availability and uses it automatically
every time that you run ADMT.
Note
When you perform an intraforest migration, the domain controller that holds the relative
ID (RID) operations master (also known as flexible single master operations or FSMO)
role is always used by default. If you select a domain controller other than the RID master
as the preferred domain controller, ADMT overrides your selection and always uses the
RID master.
To configure a preferred domain controller in the source domain
At a command prompt, type the following command, and then press ENTER:
admt config setdomaincontroller /Domain:<DomainName> /sdc:<SourceDomainController>
Value
Description
DomainName
SourceDomainController
At a command prompt, type the following command, and then press ENTER:
admt config setdomaincontroller /Domain:<DomainName> /tdc:<TargetDomainController>
Value
Description
DomainName
TargetDomainController
You can also clear the preferred domain controller that you have configured in the source or
target domain.
To clear preferred domain controllers in a specified domain
247
At a command prompt, type the following command, and then press ENTER:
admt config cleardomaincontrollers /Domain:<DomainName>
Value
Description
DomainName
You can also display the preferred domain controllers that you have configured in the source or
target domain.
To display preferred domain controllers that you have configured
At a command prompt, type the following command, and then press ENTER:
admt config getdomaincontrollers
Use SourceName, TargetRDN, TargetSAM, and TargetUPN as column headings at the top of the
include file. SourceName is the name of the source account, and it must be listed as the first column
heading.
Note
If the target user principal name (UPN) for a user requires you to specify a domain
name that is different from the target domain UPN, use this format to ensure that the
user name is preserved and not altered by ADMT during migration.
You must specify the account name as user name, relative distinguished name, or canonical name. If you
specify the account name as a relative distinguished name, you must also specify the source
organizational unit (OU).
248
The TargetRDN, TargetSAM, and TargetUPN column headings are optional, and you can list them in
any order.
Note
The TargetUPN column heading is only relevant during user account migrations
because group and computer accounts do not have a UPN.
The following are examples of valid include files in which the rename option is used:
SourceName,TargetSam
abc,def
This include file entry changes the TargetSam account name for user "abc" to "def." The
TargetRDN and the TargetUPN, which you did not specify in the include file, does not change as
a result of the migration.
SourceName,TargetRDN,TargetUPN
abc,CN=def,[email protected]
This include file entry changes the TargetRDN for user abc to CN=def and the TargetUPN to
[email protected]. The TargetSAM for user abc does not change as a result of the migration.
Important
You must specify CN= before you use an RDN value.
On the:
249
At a command prompt, type the following command, and then press ENTER:
admt computer /sd:<SourceDomain> /td:<TargetDomain> /F:<IncludeFileName>
Note
For the appropriate command-line syntax for migrating users and groups, search for
"admt user" and "admt group" in ADMT version 3.1 (v3.1) Help.
The following information describes the fields of an include file and provides examples of each
field:
SourceName Field
The SOURCENAME field specifies the name of the source object. You can specify either an account
name or a relative distinguished name. If you only specify source names, it is optional to define a
header on the first line in the file.
The following example includes a header line indicating the SOURCENAME field and a source
object name that is specified in several formats. The second line specifies an account name. The
third line specifies an account name in Windows NT 4.0 account name format. The fourth line
specifies a relative distinguished name.
SourceName
NAME
DOMAIN\NAME
CN=NAME
TargetName Field
You can use the TARGETNAME field to specify a base name which is used to generate a target
relative distinguished name, a target Security Accounts Manager (SAM) account name and a
target user principal name (UPN). The TARGETNAME field cannot be combined with other target
name fields that are discussed below.
Note
The target UPN is generated only for user objects, and only a UPN prefix is generated. A
UPN suffix is appended using an algorithm that depends on whether a UPN suffix is
250
defined for the target organizational unit (OU) or for the target forest. If the object is a
computer, the target SAM account name includes a "$" suffix.
Given the following example input, the target relative distinguished name, target SAM account
name, and target UPN generated are "CN=NEWNAME", "NEWNAME" and "NEWNAME" respectively.
SourceName,TargetName
OLDNAME, NEWNAME
CN=NEWNAME
SourceName,TargetRDN,TargetSAM
OLDNAME,
SourceName,TargetRDN,TargetSAM,TargetUPN
OLDNAME,
SourceName,TargetSAM,TargetUPN,TargetRDN
Note
Use this format when you are renaming user objects, for example, to accommodate
specifying a target domain of a different domain for the target UPN. For more information,
see Rename Objects During Migration.
OLDNAME, NEWSAMNAME, [email protected],
"CN=NEW NAME"
Note
You can also rename objects during migration by using an include file. For more
information about how to use an include file, see Rename Objects During Migration.
You can use option files to specify one or more parameters for migration tasks. An option file
eliminates the need to provide parameters each time that you run a task from the command line.
You have two options to create an option file. You can:
Create a single option file that contains sections for each type of migration task.
Create separate option files with unique settings for each type of migration task.
The Migration section in the option file specifies parameters that apply to all tasks. Subsequent
sections specify parameters that are task specific.
Use the following option file as a reference to customize the option file for your migration.
[Migration]
IntraForest=No
SourceDomain=SOURCEDOMAINNAME
SourceOu=SOURCEOUPATH
TargetDomain=TARGETDOMAINNAME
TargetOu=TARGETOUPATH
PasswordOption=Complex
PasswordServer=""
PasswordFile=""
ConflictOptions=Ignore
UserPropertiesToExclude=""
InetOrgPersonPropertiesToExclude=""
GroupPropertiesToExclude=""
ComputerPropertiesToExclude=""
[User]
DisableOption=EnableTarget
SourceExpiration=None
MigrateSIDs=Yes
TranslateRoamingProfile=No
UpdateUserRights=No
MigrateGroups=No
UpdatePreviouslyMigratedObjects=No
FixGroupMembership=Yes
MigrateServiceAccounts=No
UpdateGroupRights=No
[Group]
MigrateSIDs=Yes
UpdatePreviouslyMigratedObjects=No
252
FixGroupMembership=Yes
UpdateGroupRights=No
MigrateMembers=No
DisableOption=EnableTarget
SourceExpiration=None
TranslateRoamingProfile=No
MigrateServiceAccounts=No
[Security]
TranslationOption=Add
TranslateFilesAndFolders=No
TranslateLocalGroups=No
TranslatePrinters=No
TranslateRegistry=No
TranslateShares=No
TranslateUserProfiles=No
TranslateUserRights=No
SidMappingFile=SIDMAPPINGFILE
You can comment out options by a adding a semicolon at the beginning of a line.
Note
When a parameter is not specified, the default setting is used.
Troubleshooting ADMT
Applies to: Active Directory Migration Tool 3.1 (ADMT 3.1) and ADMT 3.2
To troubleshoot your migration process, follow these troubleshooting recommendations:
Uninstall ADMT.
2.
Make sure user has write access on specified instance and can create database.
The SQL Server Express Edition service account group that is created during SQL Server
installation is granted permissions to the ADMT database folder. The user installing ADMT
needs to be added to the service account group. However, if the account being used to install
ADMT is the same as the one used to install SQL Server Express Edition, the account is
added to this group as part of the SQL Server installation.
For SQL Server 2005 Express Edition, the service account group is
SQLServer2005MSSQLUser$MACHINE NAME$INSTANCE NAME.
For SQL Server 2008 Express Edition, the service account group is
SQLServerMSSQLUser$MACHINE NAME$INSTANCE NAME.
3.
Reinstall ADMT.
254
Note
If you observe this behavior with the full version of SQL Server, ensure the account
installing ADMT has permissions to create and connect to the database on the SQL
Server instance.
2.
When HB-ACCT-WC\Bob is migrated again to fix his group accounts, HAY-BUV\Bob will be a
member of HAY-BUV\Writers, HAY-BUV\Editors, and HAY-BUV\TechEditors.
To reset the account to only the groups of the source user, you must delete the target account
and then repeat the migration of the source account.
It is also possible to remigrate groups with the Remove existing members option.
Permissions on a user that is migrated from an Active Directory domain are reset to
default values during migration
255
When you migrate a user from one Active Directory domain to another, the User Account
Migration Wizard creates a new security descriptor on migrated user objects by using settings
from the target domain. The Security tab is only visible if you select View\Advanced Features.
This is by design, because the target domain, not the source domain, dictates security settings on
the migrated user account.
Incorrect error message is displayed during user group fix-up if a user account is deleted
After a migration, if you delete a user account in the target domain and a group that contained the
user account in the source domain (as a member of another group), is migrated between the
same domains, ADMT logs the following wrong error message:
Cannot add <account> to <group>, because <account> has not been migrated to the target
domain.
If you receive this error message, remigrate the user account to the target domain.
Exclusion of the useraccountcontrol property is ignored
The user property userAccountControl is always copied when you migrate from
Windows NT 4.0 domains. Even if you choose to exclude this property on the Object Property
Exclusion wizard page, the exclusion is ignored and the property is migrated.
However, when you migrate from Active Directory domains, the exclusion of this property is
honored and it is not be copied during user migration.
The Remove existing user rights option did not work
Cause: If the Group Policy template that is associated with a user whose user rights are being
removed contains the non-domain-qualified name of the user (for example, if it contains User1
instead of DomainA\User1), the remove operation fails.
Solution: Correct the user name entry in the Group Policy template.
You receive the following error when you try to migrate users with SID history
Unable to migrate users. The following configuration required for SID history has not been
performed. Auditing has not been enabled in the target domain. Unspecified error (0x80004005)
This error can occur because some subcategories for the Directory Service Audit Policy are not
enabled by default in Windows Server 2008 and Windows Server 2008 R2. All subcategories
must be enabled to migrate users with their SID history. For more information about how to
enable them, see Configuring the Source and Target Domains for SID History Migration.
256
When you migrate a member of a previously migrated local group, the source account for that
member is not removed when the target member is added. If the member is migrated before you
migrate the local group, only the target account member is added.
This is by design and applies to interforest migrations only.
Group member list is not updated for a group that includes a migrated group from a third
domain
If you migrate a group, any groups in a third domain that include that original group as a member
still refer to the group in the source domain. When you perform an intraforest migration, group
members retain access to resources because the security identifier (SID) history is migrated
automatically. When you perform an interforest migration, group membership must be fixed
unless SID history is migrated.
Use the group migration wizard to migrate users that belong to nested groups
If Migrate associated user groups is selected, the User Account Migration Wizard only migrates
the groups that the user is directly a member of. It does not migrate groups that the user is a
member of through group nesting.
When you migrate groups by using the Group Account Migration Wizard, if Copy group
members is selected, the wizard recursively migrates all users and groups that are members of
that group, including groups that are members through group nesting.
Where the source domain is running Windows 2000 or Windows Server 2003, with group nesting,
we recommend that you migrate the objects that are affected by using the Group Account
Migration Wizard, if you want to preserve group membership that is gained through such nesting.
Services must be identified on all computers before service accounts are migrated
If you identify services on servers using the Service Account Migration Wizard after user
migration has taken place, the configuration of these services with the migrated account and
password information will fail. To configure these services you have to rerun the user migration.
Service account migration on Windows Server 2008 and Windows Vista takes longer than
expected
If you are running service account migration at a computer that is running Windows Server 2008
or Windows Vista and it is taking much longer than expected, you might increase performance by
enabling a Windows Firewall exception for Remote Service Management on the computer that is
being used. For more information, see the following procedure.
To add a Windows Firewall exception for Remote Service Management
1.
Open Control Panel (Classic View), and then open Windows Firewall.
2.
3.
Make sure that the Remote Service Management check box is selected.
4.
Click OK.
that managed service account. The attacker may also use the managed service account
credentials to access other data.
To mitigate this risk, ADMT logs changes to the security descriptors of the migrated managed
service accounts for reference. If the Computer Migration Wizard crashes, check the log file for
the migrated computer. For each managed service account, verify that the permission was
revoked. If it was not, manually revoke these changes in Active Directory Domain Services
(AD DS) to prevent the target computers from being granted elevated permissions to reset
passwords and enable and disable the managed service accounts.
The changes to the security descriptors are logged in the computer migration log file that is
named Migration<TaskID>.log. The log file is located in the %windir%\ADMT\Logs folder on the
computer that runs ADMT. The log messages and their descriptions are listed in the following
table.
Log message
To manually revoke the changes to the security descriptor, complete the following procedure.
To revoke changes to the security descriptor of a migrated managed services account
1.
Open Active Directory Users and Computers. To open Active Directory Users and Computers, click
Start, click Control Panel, double-click Administrative Tools, and then double-click Active Directory
Users and Computers.
2.
3.
Navigate to the container that has the managed service account, right-click the account, and then click
Properties.
By default, managed service accounts are created in the Managed Service Accounts
container.
259
4.
Click the Security tab, and then click the access control entry for the computer object.
5.
6.
Click Advanced.
7.
Click the access control entry for the computer object, click Edit, and then for Write
userAccountCntrol, clear the Allow check box.
8.
Click OK twice, click Apply, and then click OK again to close the Properties dialog box.
the message An instance of the agent is already running with each subsequent agent
deployment until either the ADMT agent process is closed or the remote computer is rebooted.
Computer migration may fail if a computer account with the same NetBios name already
exists in the target domain
When you migrate a computer back and forth between two domains, the agent dispatch might fail
if a computer account with the same NetBIOS name as the computer that is being migrated from
the source domain already exists in the target domain.
ADMT could not change the domain affiliation of a particular computer. This failure caused
the computer to lose affiliation with any domain.
Cause: This can be caused by an incorrect migration environment configuration or some
malfunction with either the source computer or target computer.
Solution: Join the computer to a domain and create the computer account in the domain as
described in the following procedures.
To join a domain, you must enter credentials of an account with administrative permissions on the
domain that you want the computer to join. You must restart the computer to complete the joining
of the computer to the domain.
To change the domain membership of a computer that is running Windows 2000 (for
1.
2.
3.
4.
In Computer Name Changes, select Domain:, and then type the name of the domain that you want the
computer to join. Click OK, and when you are prompted to restart the computer, click OK again.
To change the domain membership of a computer that is running Windows Vista,
1.
2.
3.
4.
5.
In Computer Name Changes, select Domain, and then type the name of the domain that you want the
computer to join. Click OK, and when you are prompted to restart the computer, click OK again.
261
In Active Directory Users and Computers, on the View menu, click Advanced Features.
2.
3.
On the Security tab, allow the Change Password permission for Everyone and for the user.
To remove the User Must Change Password flag
In Active Directory Users and Computers, right-click the user, and then click Reset Password.
262
Solution: Reset the user account passwords to a value that fits the new domain's password
policy, and enable the user accounts if they were disabled as a result of repeated password
failure.
Migrated users receive an error indicating that their user name or password is incorrect.
Cause: Migrated users cannot log on because of password policy, even though password
policies appear to be disabled.
During a migration, some administrators may choose to disable their password policies on the
target domain. If they try to accomplish this by turning off the minimum password length policy
without setting the policy to zero, it is possible that the users cannot log on because a password
policy is still in effect.
Solution: Set the minimum password length policy to zero. After the zero length policy is in
effect, the minimum password length policy can be turned off.
263
If you receive an error message, it is almost certain that you have not configured the environment
correctly, and you should review the configuration topics before you try the migration again.
SID history migration is not working.
Cause: There are a number of conditions that must be satisfied for SID history migration to work.
Solution: Configure the migration environment correctly before you run ADMT, and review the
configuration topics before you proceed with the migration.
Note
When you migrate a previously migrated security principal to a new domain, the criteria
for migrating SID history should be in place for all three domains.
For example, say that you have the following three domains: DomainA, DomainB, and DomainC.
User1 in DomainA (DomainA\User1) is migrated to DomainB as DomainB\User1 and SID history
is translated. DomainB\User1 now has the primary SID for DomainB\User1 and the SID history
value for DomainA\User1. If an administrator wants to migrate DomainB\User1 to DomainC\User1
and preserve all of DomainB\User1's SIDs, the proper configuration settings must be in place to
allow migration from DomainA to DomainC and from DomainB to DomainC. If DomainA has been
decommissioned, or if proper configuration cannot be satisfied between DomainA and DomainC,
ADMT migrates the SID for DomainB\User1 to DomainC\User1 and logs the fact that it could not
migrate the DomainA\User1 SID.
If DomainA does not exist, ADMT writes an error message to the log, but migration still succeeds.
You can ignore this error message.
After migration, new user accounts in the target domain cannot access resources where
the source domain accounts have permissions.
Cause: The settings that are necessary to run ADMT have not been correctly established.
Most migration problems are caused by an incorrectly configured migration environment.
Solution: Open the migration log file, and find the account that you migrated with SID history. If
SID history was added to the account, you should see an entry similar to the following:
2005-10-06 18:28:50-SID for USERACCOUNTNAME added to the SID history of
USERACCOUNTNAME
If you receive an error message, it is almost certain that you have not configured the environment
correctly, and you should review the configuration topics before you try the migration again.
I am receiving the following error: "The Recycle Bin on C:\ is corrupt or invalid. Do you
want to empty the Recycle Bin for this drive?"
Cause: This is by design. For security reasons, each user who logs on to a Windows 2000 or
Windows Server 2003 computer receives their own, user-specific Recycle Bin. The access
control list (ACL) for each instance of the Recycle Bin can contain only one user-specific SID.
When you migrate a user's profile using the Add option, the SID of the source domain user is
added to the SID history of the Recycle Bin. This places two user-specific SIDs in the Recycle
Bin's ACL. This problem does not occur if you migrate the profiles by using the Replace option.
Solution: On the error message, click Yes, and the Recycle Bin is emptied without a problem. If
you click No, the error continues to appear until you empty the Recycle Bin.
264
Users in domains that are not trusted cannot access Distributed File System (DFS) shares
in Active Directory domains.
Cause: This is by design.
Solution: If you plan to use DFS shares in your domain, migrate the computers that belong to
users who access DFS shares first or migrate the computers and users in the same migration
session.
Important
We strongly recommend that you migrate users and groups only between native mode
domains only.
Migrated objects table does not sync
If the administrator in the target domain deletes a migrated group after the migration, the entries
for the migrated group are not removed from the migrated object table. If a group with the same
name as the group that is deleted in the target domain is migrated from the source domain, an
error can occur. This error occurs only if users are migrated with the group. The error message is
as follows:
ERR2:7422 Failed to move object <object_RDN>, hr=80070057 The parameter is incorrect.
When you log in with verbose mode, you may have to change the value of the %TEMP%
environment variable before you dispatch an agent.
Generated reports do not show up in the ADMT.
Cause: When ADMT generates reports, it does not update the console automatically.
Solution: To view the reports, close and then reopen ADMT.
Running multiple instances of ADMT in multiple languages
When you run multiple instances of ADMT where different instances are using different
languages, the log files are generated in the language that the instance is being run in. This does
not affect the functionality of ADMT in any way. However, we recommend that you use a unified
language when you run multiple instances of ADMT.
Solution: An agent is dispatched to a remote computer that uses the credentials of the account
that is used to run ADMT. After the agent is installed on the remote computer, it runs under the
Local System account. The credentials that you provide to the wizard, before the agent is
dispatched to the remote computer, are used to write results back to a share that is created on
the computer on which ADMT is running. The agent must have the right to log on locally to the
remote computer, and, if the agent is used to migrate computers, it must have administrative
rights in the source domain and be a local administrator on all workstations.
To ensure that you have the correct credentials, create trusts so that the source and target
domain trust each other. Add the Domain Admins group of the target domain (target\Domain
Admins) to the built-in Administrators group of the source domain (source\Administrators). Log on
by using the target\Domain Admins account, and supply a set of credentials for the
source\Administrators account when you are prompted. This provides you with administrative
permissions on both the source domain and target domain.
Agent dispatch operations fail with credentials conflict errors
Cause: You have an active connection, such as a mapped drive or a printer, to a computer on
which an agent is being installed. The dispatch operation fails because the credentials of the
agent installation conflict with the existing set of credentials.
Solution: Remove any active connections between the computer that is running ADMT and the
computer to which the agent is being dispatched.
When I try to view the results of a remote agent operation, I receive the following error:
"Cannot open the \\ComputerName\(%SystemRoot%)$\temp\dctlog.txt file."
Cause: The default administrative share for the system volume of the computer to which the
agent was dispatched is not enabled.
Because the default share is not enabled, ADMT cannot read the log file.
Solution: Re-enable the default share of the system volume.
When generating reports, I receive IDispatch error 3107
Cause: This error may occur when the Agent Monitor is closed before all agents have finished
writing their results back to the ADMT reporting database.
Solution: To prevent this problem, wait until all agents have completed their tasks before closing
the Agent Monitor.
I need to know which protocols and ports ADMT uses to establish console communication
with domain controllers and ADMT agents running on workstations
Cause: When you run ADMT in environments that have a firewall, you might have to make
firewall port exceptions to support ADMT-related traffic on your network.
Solution: The ADMT console uses Lightweight Directory Access Protocol (LDAP) port 389 to
communicate with domain controllers and Remote Procedure Call (RPC) to communicate with
ADMT agents. For RPC communication, any available RPC port in the range between 1024 and
5000 might be used. For more information, see 836429 in the Microsoft Knowledge Base
(http://go.microsoft.com/fwlink/?LinkId=122010).
Why are files that ADMT generates for agent deployment not removed after use?
268
Files that are generated on client computers where the ADMT agent service was run for security
translation of local groups are placed in %windir%\onepointdomainagent.
Files at this location can remain after reboot for the following reasons:
If after you remove ADMT from the computer, you do not perform registry cleanup to remove any
entries from the HKLM\Software\Microsoft\ADMT path.
If you reboot the computer without waiting for ADMT agent processes to exit or complete. To verify
that ADMT processes have been exited, you can use Task Manager to verify that ADMTAgnt.exe and
DctAgentServices.exe are no longer listed on the Processes tab. If either of these processes is listed,
use Task Manager to end them first before you perform a reboot.
Additional Resources
Applies to: Active Directory Migration Tool 3.1 (ADMT 3.1) and ADMT 3.2
These resources contain additional information, tools, and job aids that are related to this guide.
Related information
Related tools
269