Error message "Unable to extract credentials" in Uacreddebug.log after upgrade to 11.0.0-102
5709
Created On 09/13/23 16:08 PM - Last Modified 04/19/24 22:12 PM
Symptom
- Error messages similar to below are seen in the UaCredDebug.log (C:\Program Files\Palo Alto Networks\User-Id Credential Agent)
03/27/23 11:17:56:229 [Error 427]: GetNCChanges: 0x00002105 (8453)
03/27/23 11:17:56:233 [Error 427]: GetNCChanges: 0x00002105 (8453)
03/27/23 11:17:56:237 [Error 427]: GetNCChanges: 0x00002105 (8453)
03/27/23 11:17:56:241 [Error 427]: GetNCChanges: 0x00002105 (8453)
03/27/23 11:17:56:245 [Error 427]: GetNCChanges: 0x00002105 (8453)
03/27/23 11:17:56:249 [Error 427]: GetNCChanges: 0x00002105 (8453)
03/27/23 11:17:56:253 [Error 427]: GetNCChanges: 0x00002105 (8453)
03/27/23 11:17:56:254 [Error 716]: Unable to extract credentials.
Environment
- Credential Detection with the Windows-based User-ID Agent
- UserID Credential Agent 11.0.0-102 or above
Cause
- Starting from Windows UserID Credential Agent 11.0.0-102, the agent will use a new more efficient method instead of the legacy method.
- Due to this change, the credential agent now requires new permissions for both the user (service account) and computer (RODC) so it can utilize the functions to sync/copy password hashes from the Domain Controllers.
- This feature will also work if the service account has Domain Admin privileges.
- The new UIA Credential Agent 11.0.0-102 installed the old permission as the "local system administrator" will not work and the error message is displayed in UaCredDebug.log/
Resolution
For Credential Agent 11.0, to add the new permission for user (service account) and computer (RODC), please follow the setup below:
- To add the permissions, go to 'Active Directory Users and Computers' on any Domain Controller. Under 'View', select 'Advanced Features'
- Right-click on the domain root (the domain fqdn, i.e. pantac-91-74) in the left pane, and select Properties
- Go to the 'Security' tab
- Make sure that the user and machine account that runs Credential Agent have the following permissions:
- Replicating Directory Changes
- Replicating Directory Changes All
- Replicating Directory Changes in Filtered Set
- Note: There is a Builtin group called 'Enterprise Read-only Domain Controllers' which is recommended by Microsoft for DRS access denied errors, but this would give permissions to all RODC's. Access should be granted on the principle of least privilege, so click 'Add' and change the object type to 'Computers' and find the RODC
- Make sure that the user and machine account that runs Credential Agent have the following permissions:
- Then add the permission for the Computer object
- Repeat the same process applies to the Service Account being used in the User-ID agent but with the default object types (which include 'Users').
Additional Information
Microsoft document