1

I have a complete newbie question on Active Directory.

I was provided with an IP address of a Domain Controller and credentials.

On my Windows 10 machine I opened this:

enter image description here

entered the IP address of the Domain Controller and the Status became Online, so I can guess, that I entered the IP address to a right place, but I do not understand well enough where do I enter the credentials.

When I press OK I get this:

enter image description here

I do not need my Windows 10 machine to be included to the domain, but I need to see the users and computes in Active Directory. Is it possible?

Do I use a right tool?

EDIT1:

The right tool:

enter image description here

1
  • 1
    You should really be asking the people who gave you these credentials these questions if you have not yet. Commented 10 hours ago

3 Answers 3

2

First, that's the wrong console – "Users and Computers" is dsa.msc. (Though all of them use the same credentials. You can also run mmc.exe and build a custom AD mega-console.)

Second, if all you have is an IP address, then that's not enough for a secure connection. Both Kerberos and TLS generally require a full domain name of the system you're connecting to (i.e. the domain controller in this case).

Without that, the AD clients will only be able to use NTLM security – probably okay if it's used over some kind of corporate VPN, but really bad practice in general.

If the program doesn't ask you for credentials, there are still two ways to run it with different network credentials than the default ones:

  • The easiest way is to store the credentials in your Windows Credential Manager:

    cmdkey /add:dc01.ad.example.com /user:[email protected] /p
    -or-
    cmdkey /add:*.ad.example.com /user:[email protected] /p
    

    The parameter to /add: is the server name you're connecting to. When connecting to an IP address, specify that IP address. When connecting to a hostname, specify that hostname, e.g. dc1.example.com (wildcards like *.example.com also work).

    You can also do this through the "Credential Manager" GUI; make sure to create it as a "Windows" credential and not a "Generic" one.

    enter image description here

  • The other way is to use runas /netonly, but this can conflict with UAC (depending on your UAC level) due to mmc.exe being marked as requiring elevation whereas the result of runas is non-elevated.

    runas /netonly /u:[email protected] cmd
    

    (Not 'full' runas as your system doesn't have the account in question, and the Active Directory consoles actually refuse being run under runas anyway, but /netonly will suffice.)

In both cases, it is strongly preferred to specify the username as user@domain or user@REALM – e.g. [email protected] or [email protected]not as the legacy DOM\user syntax.

Domain-joined machines still recognize the latter format as equivalent, but a non-joined one wouldn't be able to discover the domain controllers for Kerberos if it doesn't know the full domain name, therefore limiting you to insecure NTLM authentication.

(Though at the moment, using raw IP addresses already limits you to NTLM anyway...)

Another note: Connecting from a non-joined machine can result in connections being somewhat slow, as Windows often does not properly cache the Kerberos tickets and will keep re-acquiring them anew for every connection (even though they remain valid for several hours).

3

The screenshot shows you are using Active Directory Sites and Services, but you are looking for Users and Computers, which is a different Active Directory program.

Open the correct Active Directory Users and Computers program first, then connect to the server, and it should work.

4
  • Run Active Directory Users and Computers. What is the login format? <IP>\administrator does not work. Commented 11 hours ago
  • You cannot log into an AD Domain with Administrator since the account does not and cannot exist. Local Administrator accounts cannot exists on the AD Domain Windows Server once the domain is active.,
    – Ramhound
    Commented 11 hours ago
  • @Ramhound I was provided with IP address, [email protected] and the password and I was able to do Get-ADUser -Server "IP address" -Credential "[email protected]" with PowerShell Commented 11 hours ago
  • You would need to join the system to the domain to use the tools you are asking about. Once the system was joined to the domain you would authenticate to the domain using that username you were provided.
    – Ramhound
    Commented 11 hours ago
0

It sounds like you might have mistyped the credentials. Be sure to type the credentials as follows (there are two ways to do it, choose only one):

Option 1: DOMAIN\username: Enter the domain name followed by a backslash (`\`) and your username.  
Option 2: [email protected]: Enter your username, then the "@" symbol, and your domain name.
7
  • I did not enter the credentials at all. The question is where do I do this? Commented 12 hours ago
  • 1
    Is your computer in another domain, or just a workgroup? You could try the following: runas /netonly /user:[Domain\User] "[Path to MMC]" Commented 12 hours ago
  • 1
    Open the run dialog (press Windows Key +R) and type the "runas" command above. just replace the "[Path to MMC]" with just mmc Commented 12 hours ago
  • What is Path to MMC? Is it %SystemRoot%\system32\dssite.msc? Commented 12 hours ago
  • 1
    @Ramhound: That's only true for certain AD configurations (like when the admins make Kerberos armoring mandatory). For Kerberos the default is to leave user auth independent from machine auth, so as long as the client can reach the DC at all, it can authenticate as a domain user via Kerberos… and legacy NTLM doesn't even require that. Given that OP was only provided an IP address and not even a hostname to connect to (which means they can only use legacy NTLM), it really doesn't sound like this is a strictly managed domain at all; it's probably all set to defaults i.e. no domain join needed.
    – grawity
    Commented 11 hours ago

You must log in to answer this question.

Start asking to get answers

Find the answer to your question by asking.

Ask question

Explore related questions

See similar questions with these tags.