I do not think so.
As I understand it SP 1 introduced the WSUS Reporters group.
to the WSUS management console.
the Administrators group. Being only in either WSUS Administrators or
WSUS Reporters has no effect is enabling access via the WSUS console mmc.
If so then a failed design. The purpose of the two WSUS groups is
server where WSUS is running.
with the domain is fine.
Yes, it is. And the number could be made greater as any account will
not have access unless it is a member of the Administrators group.
No necessary, not related to the issue.
problem. It is WSUS software that is failing, not the Windows
infrastructure.
whether the account has the need grants/rights at the Windows level.
get to work.
of the WSUS console.
console.
the SP 1 update, except for this ApiRemoting30 failure.
Post by Lawrence Garvin [MVP]Okay.. Roger.... most of this thread is just a ping-pong game now so I'm not
really going to quote much of it at all, as that's not really going to
accomplish anything.
Either you want help troubleshooting this or not -- but arguing about what
you will or won't do, or what will or won't work -- without even trying --
doesn't really encourage me to keep offering help at all.
I'm intimately familiar with, and lived through, almost =every= encountered
malfunction that occurs between the remote MMC and the WSUS Server.
[1] The remote workstation and the WSUS Server =COMPUTERS= must be member of
the same domain. But being members is not just enough. The =COMPUTER=
accounts must also be successfully authenticating with the DOMAIN
CONTROLLER - thus my suggestion to reset the computer account of the WSUS
Server, but you're convinced this couldn't possibly be the issue so you've
opted not to take that advice.
[2] A DOMAIN account used to access the WSUS Server via the remote MMC
[a] Either a member of Domain Admins, wherein Domain Admins is also a
member of the local Administrators group on the WSUS Server.
[b] A member of the local Administrators group on the WSUS Server.
[c] A member of the local WSUS Administrators group on the WSUS Server.
In addition, if reporting-ONLY is desired, a member of the local WSUS
Reporters group on the WSUS Server.
But it's absolutely pointless to even worry about reporting access if the
console isn't even accessible to those with FULL permissions!?
If your "WSUS Administrators" group is not giving access to the remote
console, then there's one of three known causes that need to be investigated
[1] The WSUS Administrators group must belong to the appropriate
security groups, and those security groups, along with the WSUS
Administrators group must have the appropriate security permissions, if the
domain account is a member of the WSUS Administrators group.
[2] The local Administrators group must have the appropriate
permissions, if the domain account is a member of the local Administrators
group or a member of the Domain Administrators group.
[3] The remote computer and the WSUS Server must have a "Domain Trust"..
[a] be AUTHENTICATED members of the same Active Directory
Domain, or
[b] the account name/password of the logged on user of the
remote machine must be identical in the SAM of the WSUS Server,
and have the correct group memberships
(Administrators, WSUS Administrators)
Now.. please don't get hung up on the term "Domain Trust" -- we're not
talking about multiple domains here, we're talking about two systems being
authenticated members of the same domain =and= the user account also being
an authenticated member of the same domain. So far, the only thing you've
actually confirmed is that the =user= account is properly authenticated.
You've not confirmed that both =computer= accounts are properly
authenticated.
Now, so far, as I recall, the only thing we've demonstrated, functionally,
is that a local ADMIN account on the WSUS Server console can successfully
access the MMC Admin Console of the WSUS Server. Nothing else works. To
me... that seems pretty simple... some security mechanism somewhere is
mucked up.
Where would you like to start?
My suggestion was the simple one --- reset the COMPUTER account of the WSUS
Server and confirm that the WSUS Server computer account is properly
authenticated with the domain. Maybe this won't make any difference at all.
But at least we will have =ELIMINATED= this possible cause!
As for [1] and [2] above, the various security permissions and memberships
of the various accounts and groups affecting WSUS operations are pretty
complex. So complex, that if [1] or [2] seems to be the case, my advice,
generally, is going to be to reinstall the entire system from scratch.
--
Lawrence Garvin, M.S., MCBMSP, MCTS(x4), MCP
Senior Data Architect, APQC, Houston, Texas
Microsoft MVP - Software Distribution (2005-2008)
MS WSUS Website: http://www.microsoft.com/wsus
My Websites: http://www.onsitechsolutions.com;
http://wsusinfo.onsitechsolutions.com
My MVP Profile: http://mvp.support.microsoft.com/profile/Lawrence.Garvin
Post by Roger Abell [MVP]differing opinions or readings apparently
I have tried everything so do not go making such accusations.
I do want this resolved, but being told things that are
not accurate nor relevant is not getting toward speedy
resolution of the problem, which is that ApiRemoting30
webservice is failing, and not due to account criteria.
This may just be something new to you then.
As I have repeatedly attempted to make clear, they are and they are.
irrelevant
I am attempting to get WSUS Reporters to work
ditto
ditto
As stated in the WSUS doc, WSUS Reporters are supposed to be able
to use the WSUS administrative console (that is what the doc call it)
in a read only mode.
That is not working.
Similarly, if the accounts are made instead members of the WSUS
Administrators group ApiRemoting30 webservice connection fails
with exactly the same symptoms.
In addition to what ?
The accounts I try can authenticate, can get served web pages
from the same server, can (if I enable local login) remote desktop
to the server successfully (and still fail to connect to ApiRemoting30).
It is totally accessible to any member of the server's Administrators
group as has been repeatly mentioned.
OK, so shift from WSUS Administrators to WSUS Reports and
outline what those "appropriate security groups" and "appropriate
security permissions" are, since I have followed in detail on that
is mentioned in the WSUS Operations Guide appendix on this and
all are fully satisfied.
I believe I responded to both domain and machine trusts when you
mentioned it, just as I had earlier ruled these out as relevant by saying
that login (type 1 and 3) is successful for the accounts.
If it were a Windows level failure I would be picking up an event log
entry. Authentication at Windows level works fine (for example, the
IIS log is showing the account in the 500 status record, which it would
not be doing if things had not progressed past authentication, and Windows
is recording the network login).
It is already eliminated, the machine is a production machine.
Were that an issue
a) domain login would not be working for accounts that are not cached
b) the DCs would be showing 672, 675, and possibly 5722 eventids
for the machine account and they are not.
etc.
Not certain which [1] or [2], from the first set or the second, but
in either case these do not seem to be moving toward a resolution
that has WSUS Reporters getting reports by remote use of the
WSUS administrative console.
Thanks anyway,
Roger
MVP 1999 to present, now Windows Server: Security
Post by Lawrence Garvin [MVP]And my very simple point is that you will *NEVER* get "WSUS Reporters" to
work,
until you =FIX= what's keeping 'WSUS Administrators" from working!!!
--
Lawrence Garvin, M.S., MCBMSP, MCTS(x4), MCP
Senior Data Architect, APQC, Houston, Texas
Microsoft MVP - Software Distribution (2005-2008)
MS WSUS Website: http://www.microsoft.com/wsus
My Websites: http://www.onsitechsolutions.com;
http://wsusinfo.onsitechsolutions.com
My MVP Profile: http://mvp.support.microsoft.com/profile/Lawrence.Garvin
Post by DaveMillsOn Mon, 24 Mar 2008 21:27:23 -0500, "Lawrence Garvin [MVP]"
snip.....
Lawrence, do you mean that adding membership of the WSUS Reporters group will
"deny" write access. This would be a quite unusual design approach but is what
is implied by your account.
--
Dave Mills
There are 10 type of people, those that understand binary and those that don't.
Post by Lawrence Garvin [MVP]No.
I was describing the basic requirements of remote admin access
functionality... and one of the two things required is;
The above is required if somebody wants read-write access to the remote
admin console.
As an afterthought (because I knew Roger was going to focus back on "WSUS
Perhaps I should have said "Alternatively..." instead of "In addition..."
???
--
Lawrence Garvin, M.S., MCBMSP, MCTS(x4), MCP
Senior Data Architect, APQC, Houston, Texas
Microsoft MVP - Software Distribution (2005-2008)
MS WSUS Website: http://www.microsoft.com/wsus
My Websites: http://www.onsitechsolutions.com;
http://wsusinfo.onsitechsolutions.com
My MVP Profile: http://mvp.support.microsoft.com/profile/Lawrence.Garvin
Post by DaveMillsOh good, sanity rules!
--
Dave Mills
There are 10 type of people, those that understand binary and those that do not.
Submitted via EggHeadCafe
Microsoft SQL Server Developer For Beginners
http://www.eggheadcafe.com/training-topic-area/SQL-Server-Developer/5/SQL-Server.aspx