DSC xComputer | Join Domain

This topic contains 1 reply, has 1 voice, and was last updated by Profile photo of James Krusic James Krusic 6 days, 8 hours ago.

  • Author
    Posts
  • #59191
    Profile photo of James Krusic
    James Krusic
    Participant

    Hello,

    Summary:
    I have a newly built Server 2012 R2 box that I would like to rename and join to the domain. Maybe I am not grasping what needs to be done. I have research google and found to use certificates and followed. But, I must be missing something, or not understanding what needs to be done.

    Error: Convertto-MOFInstance: System.InvalidOperationException error processing property 'Credential' of TYPE 'xComputer' : Converting and storing encrypted passwords as plain text is not recommended.

    Mode: Push (will be pull after I get a better understanding of DSC)

    I have been following the following: , but I believe I am mis-understanding something in it.

    Code:

    Configuration RenameJoinComputer {
    
        param (
    
        [Parameter(Mandatory=$true)]
        [string]$Domain,
    
        [Parameter(Mandatory=$true)]
        [PSCredential]$DomainCred
    
        )
    
       Import-DscResource -ModuleName xComputerManagement
    
    
        Node "OMA01P12SIB01"
        {
            xComputer ChangeDomain
            { 
                Name = "OMA01P12SIB01"
                DomainName = $Domain
                Credential = $DomainCred
            }
    
        }
    
    $Configuration = @{
        AllNodes = @(
            @{
                NodeName             = "OMA01P12SIB01"
                PsDSCAllowplaintextpassword = $true
                CertificateFile = "E:\Certificates\targetnode.cer"
                Thumbprint = "AD6127D13F564CA570A0422D4F089B308E119F6C"
            }
        )
    }
    
    }
    
    RenameJoinComputer -Domain 'contoso.com' -DomainCred (Get-Credential) -ConfigurationData $Configuration -OutputPath "E:\DSC MOF"
    
    # SIG # Begin signature block
    # MIIIPwYJKoZIhvcNAQcCoIIIMDCCCCwCAQExCzAJBgUrDgMCGgUAMGkGCisGAQQB
    # gjcCAQSgWzBZMDQGCisGAQQBgjcCAR4wJgIDAQAABBAfzDtgWUsITrck0sYpfvNR
    # AgEAAgEAAgEAAgEAAgEAMCEwCQYFKw4DAhoFAAQUCoZkVoIIj48ML02NHinMYJrk
    # 3NCgggWgMIIFnDCCBISgAwIBAgITbQAAAAYgad07WR+HSAAAAAAABjANBgkqhkiG
    # 9w0BAQUFADBRMRMwEQYKCZImiZPyLGQBGRYDaWNtMRcwFQYKCZImiZPyLGQBGRYH
    # YXJtd2VzdDEhMB8GA1UEAxMYYXJtd2VzdC1PTUEwMVAxMkRTQzAxLUNBMB4XDTE2
    # MTIwMTE2MDcxMloXDTE3MTIwMTE2MDcxMlowVTETMBEGCgmSJomT8ixkARkWA2lj
    # bTEXMBUGCgmSJomT8ixkARkWB2FybXdlc3QxDjAMBgNVBAMTBVVzZXJzMRUwEwYD
    # VQQDEwxKYW1lcyBLcnVzaWMwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
    # AQCD19lZf2Oo0qe0+P94vT+migVIzCa1zo5uTmid4XVqOQmijU9fP3IHOxVNSOF/
    # ++AgiyO5LoWfWJZ6onTrrFbmUmummrrkolAC3r/leNiatXecr5lwzoxll5X2A73H
    # ObMdECp6boUeCDWptLndkmR/DQboyHdcK/3bq9xR0TZVX/PZOZV66RIe57qQZzt6
    # pzxMFRKw3cRJwyxxdqGAdVRXkV/AF8m1fn52rflNf7pzs1P7Jx9VWDooaZZEV0UG
    # ki7qdmAvay8x7PWnxebuyhuV030/xJ30/MZN5XqhCulfJH3gOXurneWPF466/oSX
    # hBKOnZMsDoEswSFUxKU+6XjJAgMBAAGjggJnMIICYzAlBgkrBgEEAYI3FAIEGB4W
    # AEMAbwBkAGUAUwBpAGcAbgBpAG4AZzATBgNVHSUEDDAKBggrBgEFBQcDAzAOBgNV
    # HQ8BAf8EBAMCB4AwHQYDVR0OBBYEFMpapVPuWKXrI1xJM2EJCoEvql3aMB8GA1Ud
    # IwQYMBaAFEduaBcWLjD/tW84jPnKK5KgQr47MIHYBgNVHR8EgdAwgc0wgcqggceg
    # gcSGgcFsZGFwOi8vL0NOPWFybXdlc3QtT01BMDFQMTJEU0MwMS1DQSxDTj1PTUEw
    # MVAxMkRTQzAxLENOPUNEUCxDTj1QdWJsaWMgS2V5IFNlcnZpY2VzLENOPVNlcnZp
    # Y2VzLENOPUNvbmZpZ3VyYXRpb24sREM9YXJtd2VzdCxEQz1pY20/Y2VydGlmaWNh
    # dGVSZXZvY2F0aW9uTGlzdD9iYXNlP29iamVjdENsYXNzPWNSTERpc3RyaWJ1dGlv
    # blBvaW50MIHGBggrBgEFBQcBAQSBuTCBtjCBswYIKwYBBQUHMAKGgaZsZGFwOi8v
    # L0NOPWFybXdlc3QtT01BMDFQMTJEU0MwMS1DQSxDTj1BSUEsQ049UHVibGljIEtl
    # eSBTZXJ2aWNlcyxDTj1TZXJ2aWNlcyxDTj1Db25maWd1cmF0aW9uLERDPWFybXdl
    # c3QsREM9aWNtP2NBQ2VydGlmaWNhdGU/YmFzZT9vYmplY3RDbGFzcz1jZXJ0aWZp
    # Y2F0aW9uQXV0aG9yaXR5MDEGA1UdEQQqMCigJgYKKwYBBAGCNxQCA6AYDBZzYV9q
    # a3J1c2ljQGFybXdlc3QuaWNtMA0GCSqGSIb3DQEBBQUAA4IBAQBxxJI4FUw3BDko
    # EtEJV99Oa64H4ZPrfV9fHRL7F2Xa78vuN7mWVzAtpISzl5PRTNEGmgfgD2iw8G1q
    # Y6IWvtF/v1axL0z2LwqeK+7rClvrLm8BYHQ/1pgjyASB/ivNXe5A1Ok5zAkG7vMD
    # jZSIeiyDBTZg9Z8X7U2VArM9Jkz18+blS6PpBWu/Aw3rDv67kLx2ZLS1mz4eNdG9
    # r3C4c1c/lMt3BwaWdOFl8DLtaitFGlR3UxEdqj3Ox3OrOGgdZVYJikFoLcz3XyB3
    # +AzjXmbYUWax+ysC4FO6hwY2pemK7ti39ymcWQhQuai2nRhcXkAuupB4qOE7vvfN
    # /WUHZhCGMYICCTCCAgUCAQEwaDBRMRMwEQYKCZImiZPyLGQBGRYDaWNtMRcwFQYK
    # CZImiZPyLGQBGRYHYXJtd2VzdDEhMB8GA1UEAxMYYXJtd2VzdC1PTUEwMVAxMkRT
    # QzAxLUNBAhNtAAAABiBp3TtZH4dIAAAAAAAGMAkGBSsOAwIaBQCgeDAYBgorBgEE
    # AYI3AgEMMQowCKACgAChAoAAMBkGCSqGSIb3DQEJAzEMBgorBgEEAYI3AgEEMBwG
    # CisGAQQBgjcCAQsxDjAMBgorBgEEAYI3AgEVMCMGCSqGSIb3DQEJBDEWBBTHZO93
    # GC5DBTV1tXIx5X0a3XEowjANBgkqhkiG9w0BAQEFAASCAQACUW7JHQHAby7mrMgS
    # +QAm0pUrSzXmsUxu5lqaB8QZhZJbg6qzUJ7ppXfQS0KQGz+qQXWKXIgA6y9QDy6M
    # D3mYN15lZC4VFp6xbS0OpLs6HVbXvrGiYS5iqt+LzFr2+gFW0Th/vvKKuplUEVa4
    # dyFd0uxHZzEXKRWEC1Or/wKyp1Q66eD5xzPv4iHVN1OdaJmQUP1mVHPcKVhML0eC
    # /sQZbmFSWjqYoI+6U3yiSTStaDHTt4x0xSAX5PaeWdLD3NunVO4kwFu9dUA5dLG8
    # 4EO/5W4GCRosuHbfLmpcpAETexyLLR+EEA02lS2MnpwgUleFSELNNfo80gpygUlO
    # D90V
    # SIG # End signature block
    

    Does the LCM on the Push Server need to be set to use the certificate? On the Target off domain server the Certificate is installed Personal and the root certificate in Trusted Root Certificate Authority store.

  • #59199
    Profile photo of James Krusic
    James Krusic
    Participant

    Resolved: I found the issue. I needed to point the LCM of the target computer to use the Certificate Thumbprint and execution the LCM configuration.

    After that I just needed to run the DSC configuration.

    Thank you

You must be logged in to reply to this topic.