How to grant ReadServicePrincipalName and WriteServicePrincipalName rights to SQL Server service start-up account without using ADSDIEDIT tool.

Published Jan 15 2019 12:36 PM 1,081 Views
First published on MSDN on Jan 06, 2010

I hope you probably know how to fix below different authentication related errors that can occur while connecting to SQL Server with Windows Integrated Authentication.






1. Login failed for user '(null)'. Reason: Not associated with a trusted SQL Server connection.




2. Login Failed for user 'NT Authority\ANONYMOUS' LOGON




3. Login Failed for user ' ', the user is not associated with a trusted SQL Server connection




4. Cannot Generate SSPI Context




5. SSPI handshake failed with error code 0xc0000413 while establishing a connection with integrated security; the connection has been closed.






The focus of this post is not to discuss above different errors and their resolutions because they have already been covered by some very good resources below.






1.       How to use Kerberos authentication in SQL Server - http://support.microsoft.com/kb/319723





  1. Kerberos Authentication in Windows Server 2003 - http://www.microsoft.com/windowsserver2003/technologies/security/kerberos/default.mspx



  2. Understanding Kerberos and NTLM authentication in SQL Server Connections - http://blogs.msdn.com/sql_protocols/archive/2006/12/02/understanding-kerberos-and-ntlm-authent...



  3. Using Kerberos with SQL Server - http://blogs.msdn.com/sql_protocols/archive/2005/10/12/479871.aspx



  4. Kerberos Authentication and SQL Server 2008 - http://technet.microsoft.com/en-us/library/cc280744.aspx



  5. Understanding Kerberos and NTLM authentication in SQL Server Connections - http://blogs.msdn.com/sql_protocols/archive/2006/12/02/understanding-kerberos-and-ntlm-authent...



  6. Microsoft SQL Server Tips & Tricks (Kerberos Authentication in SQL Server 2005) - http://blogs.msdn.com/sqlserverfaq/archive/2008/05/06/use-of-kerberos-authentication-in-sql-se...



  7. Service Principal Names - http://msdn.microsoft.com/en-us/library/ms677949.aspx






If you go through the above articles, you will find that for most of the above errors, the resolution will involve correcting or setting SQL Server SPNs which can be done using SetSPN utility.  Instead of setting SPNs manually, you may want to give ReadServicePrincipalName and WriteServicePrincipalName rights to SQL Server service start-up account so that it can register and de-register SQL Server SPNs on its own whenever the SQL Server service is started and stopped.  As the above articles describe, these rights can be granted from ADSIEDIT tool.  But recently I got a question where I was asked if there is a way other than ADSIEDIT tool to perform this operation.  Well, here is the answer.




Below is an easy command-line way to perform this operation.  This can be done over the command prompt using utility called ‘dsacls’ instead of ‘SetSPN’.  Below is the command and need to be run with domain admin rights (as was always required for setting/modifying/deleting SPNs).






dsacls < DomainName_of_Service_Account > /G SELF:RPWP;"servicePrincipalName"






To set the permissions, the above command assigns the SELF account Read/Write servicePrincipalName. The permissions are applied onto this object only on the service account object.







/G - Grant




RPWP - Read Property Write Property




The Dsacls command-line tool is included when you install Windows Server 2003 Support Tools from the product CD or from below Microsoft Download Center.




Windows Server 2003 Service Pack 2 32-bit Support Tools - http://www.microsoft.com/downloads/details.aspx?FamilyID=96a35011-fd83-419d-939b-9a772ea2df90&D...




For more information about how to install Windows Support Tools from the product CD, check below.




Install Windows Support Tools - http://technet.microsoft.com/en-us/library/cc755948(WS.10).aspx




For more information on Dsacls, below are the articles.




How to Use Dsacls.exe in Windows Server 2003 and Windows 2000 - http://support.microsoft.com/kb/281146




·         Dsacls Overview - http://technet.microsoft.com/en-us/library/cc755938(WS.10).aspx







NOTE - This is in no way recommended to do on a SQL Cluster Instance. We do not recommend to allow the auto update of the SPN in a SQL cluster. In Stand Alone it is okay to do this procedure when using a domain account for the SQL Server Service. Do not need to do this if SQL is running under system since system already has the write SPN privilege.



Author : Deepak (MSFT) , SQL Developer Engineer , Microsoft


Reviewed by : Evan (MSFT) , SQL Escalation Services, Microsoft

%3CLINGO-SUB%20id%3D%22lingo-sub-315928%22%20slang%3D%22en-US%22%3EHow%20to%20grant%20ReadServicePrincipalName%20and%20WriteServicePrincipalName%20rights%20to%20SQL%20Server%20service%20start-up%20account%20without%20using%20ADSDIEDIT%20tool.%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-315928%22%20slang%3D%22en-US%22%3E%0A%20%26lt%3Bmeta%20http-equiv%3D%22Content-Type%22%20content%3D%22text%2Fhtml%3B%20charset%3DUTF-8%22%20%2F%26gt%3B%3CSTRONG%3E%20First%20published%20on%20MSDN%20on%20Jan%2006%2C%202010%20%3C%2FSTRONG%3E%20%3CBR%20%2F%3E%3CP%3EI%20hope%20you%20probably%20know%20how%20to%20fix%20below%20different%20authentication%20related%20errors%20that%20can%20occur%20while%20connecting%20to%20SQL%20Server%20with%20Windows%20Integrated%20Authentication.%3C%2FP%3E%3CBR%20%2F%3E%3CP%3E%3C%2FP%3E%3CBR%20%2F%3E%3CP%3E%3C%2FP%3E%3CBR%20%2F%3E%3CP%3E%3C%2FP%3E%3CBR%20%2F%3E%3CP%3E%3C%2FP%3E%3CBR%20%2F%3E%3CP%3E%3CI%3E%201.%20%3C%2FI%3E%20%3CI%3E%20Login%20failed%20for%20user%20'(null)'.%20Reason%3A%20Not%20associated%20with%20a%20trusted%20SQL%20Server%20connection.%20%3C%2FI%3E%3C%2FP%3E%3CBR%20%2F%3E%3CP%3E%3C%2FP%3E%3CBR%20%2F%3E%3CP%3E%3C%2FP%3E%3CBR%20%2F%3E%3CP%3E%3CI%3E%202.%20%3C%2FI%3E%20%3CI%3E%20Login%20Failed%20for%20user%20'NT%20Authority%5CANONYMOUS'%20LOGON%20%3C%2FI%3E%3C%2FP%3E%3CBR%20%2F%3E%3CP%3E%3C%2FP%3E%3CBR%20%2F%3E%3CP%3E%3C%2FP%3E%3CBR%20%2F%3E%3CP%3E%3CI%3E%203.%20%3C%2FI%3E%20%3CI%3E%20Login%20Failed%20for%20user%20'%20'%2C%20the%20user%20is%20not%20associated%20with%20a%20trusted%20SQL%20Server%20connection%20%3C%2FI%3E%3C%2FP%3E%3CBR%20%2F%3E%3CP%3E%3C%2FP%3E%3CBR%20%2F%3E%3CP%3E%3C%2FP%3E%3CBR%20%2F%3E%3CP%3E%3CI%3E%204.%20%3C%2FI%3E%20%3CI%3E%20Cannot%20Generate%20SSPI%20Context%20%3C%2FI%3E%3C%2FP%3E%3CBR%20%2F%3E%3CP%3E%3C%2FP%3E%3CBR%20%2F%3E%3CP%3E%3C%2FP%3E%3CBR%20%2F%3E%3CP%3E%3CI%3E%205.%20%3C%2FI%3E%20%3CI%3E%20SSPI%20handshake%20failed%20with%20error%20code%200xc0000413%20while%20establishing%20a%20connection%20with%20integrated%20security%3B%20the%20connection%20has%20been%20closed.%20%3C%2FI%3E%3C%2FP%3E%3CBR%20%2F%3E%3CP%3E%3C%2FP%3E%3CBR%20%2F%3E%3CP%3E%3C%2FP%3E%3CBR%20%2F%3E%3CP%3E%3C%2FP%3E%3CBR%20%2F%3E%3CP%3E%3C%2FP%3E%3CBR%20%2F%3E%3CP%3EThe%20focus%20of%20this%20post%20is%20not%20to%20discuss%20above%20different%20errors%20and%20their%20resolutions%20because%20they%20have%20already%20been%20covered%20by%20some%20very%20good%20resources%20below.%3C%2FP%3E%3CBR%20%2F%3E%3CP%3E%3C%2FP%3E%3CBR%20%2F%3E%3CP%3E%3C%2FP%3E%3CBR%20%2F%3E%3CP%3E%3C%2FP%3E%3CBR%20%2F%3E%3CP%3E%3C%2FP%3E%3CBR%20%2F%3E%3CP%3E1.%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%20How%20to%20use%20Kerberos%20authentication%20in%20SQL%20Server%20-%20%3CA%20href%3D%22http%3A%2F%2Fsupport.microsoft.com%2Fkb%2F319723%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3E%20http%3A%2F%2Fsupport.microsoft.com%2Fkb%2F319723%3C%2FA%3E%3C%2FP%3E%3CBR%20%2F%3E%3CP%3E%3C%2FP%3E%3CBR%20%2F%3E%3CP%3E%3C%2FP%3E%3CBR%20%2F%3E%3COL%3E%3CBR%20%2F%3E%3CLI%3EKerberos%20Authentication%20in%20Windows%20Server%202003%20-%20%3CA%20href%3D%22http%3A%2F%2Fwww.microsoft.com%2Fwindowsserver2003%2Ftechnologies%2Fsecurity%2Fkerberos%2Fdefault.mspx%22%20title%3D%22http%3A%2F%2Fwww.microsoft.com%2Fwindowsserver2003%2Ftechnologies%2Fsecurity%2Fkerberos%2Fdefault.mspx%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3E%20http%3A%2F%2Fwww.microsoft.com%2Fwindowsserver2003%2Ftechnologies%2Fsecurity%2Fkerberos%2Fdefault.mspx%3C%2FA%3E%20%3CBR%20%2F%3E%3CP%3E%3C%2FP%3E%3CBR%20%2F%3E%3C%2FLI%3E%3CBR%20%2F%3E%3CLI%3EUnderstanding%20Kerberos%20and%20NTLM%20authentication%20in%20SQL%20Server%20Connections%20-%20%3CA%20href%3D%22http%3A%2F%2Fblogs.msdn.com%2Fsql_protocols%2Farchive%2F2006%2F12%2F02%2Funderstanding-kerberos-and-ntlm-authentication-in-sql-server-connections.aspx%22%20title%3D%22blocked%3A%3Ahttp%3A%2F%2Fblogs.msdn.com%2Fsql_protocols%2Farchive%2F2006%2F12%2F02%2Funderstanding-kerberos-and-ntlm-authentication-in-sql-server-connections.aspx%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3E%20http%3A%2F%2Fblogs.msdn.com%2Fsql_protocols%2Farchive%2F2006%2F12%2F02%2Funderstanding-kerberos-and-ntlm-authentication-in-sql-server-connections.aspx%3C%2FA%3E%20%3CBR%20%2F%3E%3CP%3E%3C%2FP%3E%3CBR%20%2F%3E%3C%2FLI%3E%3CBR%20%2F%3E%3CLI%3EUsing%20Kerberos%20with%20SQL%20Server%20-%20%3CA%20href%3D%22http%3A%2F%2Fblogs.msdn.com%2Fsql_protocols%2Farchive%2F2005%2F10%2F12%2F479871.aspx%22%20title%3D%22blocked%3A%3Ahttp%3A%2F%2Fblogs.msdn.com%2Fsql_protocols%2Farchive%2F2005%2F10%2F12%2F479871.aspx%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3E%20http%3A%2F%2Fblogs.msdn.com%2Fsql_protocols%2Farchive%2F2005%2F10%2F12%2F479871.aspx%3C%2FA%3E%20%3CBR%20%2F%3E%3CP%3E%3C%2FP%3E%3CBR%20%2F%3E%3C%2FLI%3E%3CBR%20%2F%3E%3CLI%3EKerberos%20Authentication%20and%20SQL%20Server%202008%20-%20%3CA%20href%3D%22http%3A%2F%2Ftechnet.microsoft.com%2Fen-us%2Flibrary%2Fcc280744.aspx%22%20title%3D%22http%3A%2F%2Ftechnet.microsoft.com%2Fen-us%2Flibrary%2Fcc280744.aspx%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3E%20http%3A%2F%2Ftechnet.microsoft.com%2Fen-us%2Flibrary%2Fcc280744.aspx%3C%2FA%3E%20%3CBR%20%2F%3E%3CP%3E%3C%2FP%3E%3CBR%20%2F%3E%3C%2FLI%3E%3CBR%20%2F%3E%3CLI%3EUnderstanding%20Kerberos%20and%20NTLM%20authentication%20in%20SQL%20Server%20Connections%20-%20%3CA%20href%3D%22http%3A%2F%2Fblogs.msdn.com%2Fsql_protocols%2Farchive%2F2006%2F12%2F02%2Funderstanding-kerberos-and-ntlm-authentication-in-sql-server-connections.aspx%22%20title%3D%22blocked%3A%3Ahttp%3A%2F%2Fblogs.msdn.com%2Fsql_protocols%2Farchive%2F2006%2F12%2F02%2Funderstanding-kerberos-and-ntlm-authentication-in-sql-server-connections.aspx%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3E%20http%3A%2F%2Fblogs.msdn.com%2Fsql_protocols%2Farchive%2F2006%2F12%2F02%2Funderstanding-kerberos-and-ntlm-authentication-in-sql-server-connections.aspx%3C%2FA%3E%20%3CBR%20%2F%3E%3CP%3E%3C%2FP%3E%3CBR%20%2F%3E%3C%2FLI%3E%3CBR%20%2F%3E%3CLI%3EMicrosoft%20SQL%20Server%20Tips%20%26amp%3B%20Tricks%20(Kerberos%20Authentication%20in%20SQL%20Server%202005)%20-%20%3CA%20href%3D%22http%3A%2F%2Fblogs.msdn.com%2Fsqlserverfaq%2Farchive%2F2008%2F05%2F06%2Fuse-of-kerberos-authentication-in-sql-server-2005.aspx%22%20title%3D%22blocked%3A%3Ahttp%3A%2F%2Fblogs.msdn.com%2Fsqlserverfaq%2Farchive%2F2008%2F05%2F06%2Fuse-of-kerberos-authentication-in-sql-server-2005.aspx%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3E%20http%3A%2F%2Fblogs.msdn.com%2Fsqlserverfaq%2Farchive%2F2008%2F05%2F06%2Fuse-of-kerberos-authentication-in-sql-server-2005.aspx%3C%2FA%3E%20%3CBR%20%2F%3E%3CP%3E%3C%2FP%3E%3CBR%20%2F%3E%3C%2FLI%3E%3CBR%20%2F%3E%3CLI%3EService%20Principal%20Names%20-%20%3CA%20href%3D%22http%3A%2F%2Fmsdn.microsoft.com%2Fen-us%2Flibrary%2Fms677949.aspx%22%20title%3D%22http%3A%2F%2Fmsdn.microsoft.com%2Fen-us%2Flibrary%2Fms677949.aspx%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3E%20http%3A%2F%2Fmsdn.microsoft.com%2Fen-us%2Flibrary%2Fms677949.aspx%3C%2FA%3E%20%3CBR%20%2F%3E%3CP%3E%3C%2FP%3E%3CBR%20%2F%3E%3C%2FLI%3E%3CBR%20%2F%3E%3C%2FOL%3E%3CBR%20%2F%3E%3CP%3E%3C%2FP%3E%3CBR%20%2F%3E%3CP%3E%3C%2FP%3E%3CBR%20%2F%3E%3CP%3EIf%20you%20go%20through%20the%20above%20articles%2C%20you%20will%20find%20that%20for%20most%20of%20the%20above%20errors%2C%20the%20resolution%20will%20involve%20correcting%20or%20setting%20SQL%20Server%20SPNs%20which%20can%20be%20done%20using%20SetSPN%20utility.%26nbsp%3B%20Instead%20of%20setting%20SPNs%20manually%2C%20you%20may%20want%20to%20give%20ReadServicePrincipalName%20and%20WriteServicePrincipalName%20rights%20to%20SQL%20Server%20service%20start-up%20account%20so%20that%20it%20can%20register%20and%20de-register%20SQL%20Server%20SPNs%20on%20its%20own%20whenever%20the%20SQL%20Server%20service%20is%20started%20and%20stopped.%26nbsp%3B%20As%20the%20above%20articles%20describe%2C%20these%20rights%20can%20be%20granted%20from%20ADSIEDIT%20tool.%26nbsp%3B%20But%20recently%20I%20got%20a%20question%20where%20I%20was%20asked%20if%20there%20is%20a%20way%20other%20than%20ADSIEDIT%20tool%20to%20perform%20this%20operation.%26nbsp%3B%20Well%2C%20here%20is%20the%20answer.%3C%2FP%3E%3CBR%20%2F%3E%3CP%3E%3C%2FP%3E%3CBR%20%2F%3E%3CP%3E%3C%2FP%3E%3CBR%20%2F%3E%3CP%3EBelow%20is%20an%20easy%20command-line%20way%20to%20perform%20this%20operation.%26nbsp%3B%20This%20can%20be%20done%20over%20the%20command%20prompt%20using%20utility%20called%20%E2%80%98dsacls%E2%80%99%20instead%20of%20%E2%80%98SetSPN%E2%80%99.%26nbsp%3B%20Below%20is%20the%20command%20and%20need%20to%20be%20run%20with%20domain%20admin%20rights%20(as%20was%20always%20required%20for%20setting%2Fmodifying%2Fdeleting%20SPNs).%3C%2FP%3E%3CBR%20%2F%3E%3CP%3E%3C%2FP%3E%3CBR%20%2F%3E%3CP%3E%3C%2FP%3E%3CBR%20%2F%3E%3CP%3E%3C%2FP%3E%3CBR%20%2F%3E%3CP%3E%3C%2FP%3E%3CBR%20%2F%3E%3CP%3E%3CI%3E%20%3CSTRONG%3Edsacls%20%26lt%3B%20%3C%2FSTRONG%3E%20DomainName_of_Service_Account%20%3CSTRONG%3E%20%26gt%3B%20%2FG%20SELF%3ARPWP%3B%22servicePrincipalName%22%3C%2FSTRONG%3E%20%3C%2FI%3E%3C%2FP%3E%3CBR%20%2F%3E%3CP%3E%3C%2FP%3E%3CBR%20%2F%3E%3CP%3E%3C%2FP%3E%3CBR%20%2F%3E%3CP%3E%3C%2FP%3E%3CBR%20%2F%3E%3CP%3E%3C%2FP%3E%3CBR%20%2F%3E%3CP%3ETo%20set%20the%20permissions%2C%20the%20above%20command%20assigns%20the%20SELF%20account%20Read%2FWrite%20servicePrincipalName.%20The%20permissions%20are%20applied%20onto%20%3CI%3E%20this%20object%20only%20%3C%2FI%3E%20on%20the%20service%20account%20object.%3C%2FP%3E%3CBR%20%2F%3E%3CP%3E%3C%2FP%3E%3CBR%20%2F%3E%3CP%3E%3C%2FP%3E%3CBR%20%2F%3E%3CP%3E%3C%2FP%3E%3CBR%20%2F%3E%3CP%3E%3C%2FP%3E%3CBR%20%2F%3E%3CP%3E%3C%2FP%3E%3CBR%20%2F%3E%3CP%3E%3CI%3E%2FG%20%3C%2FI%3E%20-%20Grant%3C%2FP%3E%3CBR%20%2F%3E%3CP%3E%3C%2FP%3E%3CBR%20%2F%3E%3CP%3E%3C%2FP%3E%3CBR%20%2F%3E%3CP%3E%3CI%3ERPWP%20%3C%2FI%3E%20-%20Read%20Property%20Write%20Property%3C%2FP%3E%3CBR%20%2F%3E%3CP%3E%3C%2FP%3E%3CBR%20%2F%3E%3CP%3E%3C%2FP%3E%3CBR%20%2F%3E%3CP%3EThe%20Dsacls%20command-line%20tool%20is%20included%20when%20you%20install%20Windows%20Server%202003%20Support%20Tools%20from%20the%20product%20CD%20or%20from%20below%20Microsoft%20Download%20Center.%3C%2FP%3E%3CBR%20%2F%3E%3CP%3E%3C%2FP%3E%3CBR%20%2F%3E%3CP%3E%3C%2FP%3E%3CBR%20%2F%3E%3CP%3EWindows%20Server%202003%20Service%20Pack%202%2032-bit%20Support%20Tools%20-%20%3CA%20href%3D%22http%3A%2F%2Fwww.microsoft.com%2Fdownloads%2Fdetails.aspx%3FFamilyID%3D96a35011-fd83-419d-939b-9a772ea2df90%26amp%3BDisplayLang%3Den%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3E%20http%3A%2F%2Fwww.microsoft.com%2Fdownloads%2Fdetails.aspx%3FFamilyID%3D96a35011-fd83-419d-939b-9a772ea2df90%26amp%3BDisplayLang%3Den%3C%2FA%3E%3C%2FP%3E%3CBR%20%2F%3E%3CP%3E%3C%2FP%3E%3CBR%20%2F%3E%3CP%3E%3C%2FP%3E%3CBR%20%2F%3E%3CP%3EFor%20more%20information%20about%20how%20to%20install%20Windows%20Support%20Tools%20from%20the%20product%20CD%2C%20check%20below.%3C%2FP%3E%3CBR%20%2F%3E%3CP%3E%3C%2FP%3E%3CBR%20%2F%3E%3CP%3E%3C%2FP%3E%3CBR%20%2F%3E%3CP%3EInstall%20Windows%20Support%20Tools%20-%20%3CA%20href%3D%22http%3A%2F%2Ftechnet.microsoft.com%2Fen-us%2Flibrary%2Fcc755948(WS.10).aspx%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3E%20http%3A%2F%2Ftechnet.microsoft.com%2Fen-us%2Flibrary%2Fcc755948(WS.10).aspx%3C%2FA%3E%3C%2FP%3E%3CBR%20%2F%3E%3CP%3E%3C%2FP%3E%3CBR%20%2F%3E%3CP%3E%3C%2FP%3E%3CBR%20%2F%3E%3CP%3EFor%20more%20information%20on%20Dsacls%2C%20below%20are%20the%20articles.%3C%2FP%3E%3CBR%20%2F%3E%3CP%3E%3C%2FP%3E%3CBR%20%2F%3E%3CP%3E%3C%2FP%3E%3CBR%20%2F%3E%3CP%3EHow%20to%20Use%20Dsacls.exe%20in%20Windows%20Server%202003%20and%20Windows%202000%20-%20%3CA%20href%3D%22http%3A%2F%2Fsupport.microsoft.com%2Fkb%2F281146%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3E%20http%3A%2F%2Fsupport.microsoft.com%2Fkb%2F281146%3C%2FA%3E%3C%2FP%3E%3CBR%20%2F%3E%3CP%3E%3C%2FP%3E%3CBR%20%2F%3E%3CP%3E%3C%2FP%3E%3CBR%20%2F%3E%3CP%3E%C2%B7%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%20Dsacls%20Overview%20-%20%3CA%20href%3D%22http%3A%2F%2Ftechnet.microsoft.com%2Fen-us%2Flibrary%2Fcc755938(WS.10).aspx%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3E%20http%3A%2F%2Ftechnet.microsoft.com%2Fen-us%2Flibrary%2Fcc755938(WS.10).aspx%3C%2FA%3E%3C%2FP%3E%3CBR%20%2F%3E%3CP%3E%3C%2FP%3E%3CBR%20%2F%3E%3CP%3E%3C%2FP%3E%3CBR%20%2F%3E%3CP%3E%3C%2FP%3E%3CBR%20%2F%3E%3CP%3E%3C%2FP%3E%3CBR%20%2F%3E%3CP%3E%3C%2FP%3E%3CBR%20%2F%3E%3CP%3E%3CSTRONG%3E%20NOTE%20-%20This%20is%20in%20no%20way%20recommended%20to%20do%20on%20a%20SQL%20Cluster%20Instance.%20We%20do%20not%20recommend%20to%20allow%20the%20auto%20update%20of%20the%20SPN%20in%20a%20SQL%20cluster.%20In%20Stand%20Alone%20it%20is%20okay%20to%20do%20this%20procedure%20when%20using%20a%20domain%20account%20for%20the%20SQL%20Server%20Service.%20Do%20not%20need%20to%20do%20this%20if%20SQL%20is%20running%20under%20system%20since%20system%20already%20has%20the%20write%20SPN%20privilege.%20%3C%2FSTRONG%3E%3C%2FP%3E%3CBR%20%2F%3E%3CP%3E%3C%2FP%3E%3CBR%20%2F%3E%3CP%3EAuthor%20%3A%20Deepak%20(MSFT)%20%2C%20SQL%20Developer%20Engineer%20%2C%20Microsoft%3C%2FP%3E%3CBR%20%2F%3E%3CP%3EReviewed%20by%20%3A%20Evan%20(MSFT)%20%2C%20SQL%20Escalation%20Services%2C%20Microsoft%3C%2FP%3E%0A%20%0A%3C%2FLINGO-BODY%3E%3CLINGO-TEASER%20id%3D%22lingo-teaser-315928%22%20slang%3D%22en-US%22%3EFirst%20published%20on%20MSDN%20on%20Jan%2006%2C%202010%20I%20hope%20you%20probably%20know%20how%20to%20fix%20below%20different%20authentication%20related%20errors%20that%20can%20occur%20while%20connecting%20to%20SQL%20Server%20with%20Windows%20Integrated%20Authentication.%3C%2FLINGO-TEASER%3E%3CLINGO-LABS%20id%3D%22lingo-labs-315928%22%20slang%3D%22en-US%22%3E%3CLINGO-LABEL%3Econnectivity%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3ESecurity%3C%2FLINGO-LABEL%3E%3C%2FLINGO-LABS%3E
Version history
Last update:
‎Jan 15 2019 12:36 PM
Updated by: