I’m trying to deprovision a domain account who is part of local group : ADMINISTRATORS on windows server. But it is throwing me the below error.
errors
["Exception occurred while executing the RPCRequest: Errors returned from IQService. \"Exception occurred while provisioning group WinNT://testserver/Administrators,group, Exception has been thrown by the target of an invocation.InnerException:A member could not be added to or removed from the local group because the member does not exist.\n Or it might be non-local user\""]
Could someone help me with possible solutions fore deprovisioning the domain accounts from local groups.
I also tried revoking an entitlement for an local user, But that also failed with below error. Could someone help me to confirm if i’m missing anything to deprovision access on windows local source.
[“Exception occurred while executing the RPCRequest: Errors returned from IQService. "Exception occurred while provisioning group WinNT://testserver/Users,group, Exception has been thrown by the target of an invocation.InnerException:A member could not be added to or removed from the local group because the member does not exist.\n Or it might be non-local user"”]
Domain admin accounts are protected.
Can you verify if the account has an attribute called adminCount and if it is set to 1 ?
The adminCount attribute is found on user objects in Active Directory. This is a very simple attribute. If the value is or 0 then the user is not protected by the SD Propagation. If the value of adminCount is set to 1 that means the user has, or has been a member of a protected group. The value can be seen in ADUC or ADSIEdit or LDP.
If adminCount is not set you can enable logging on the IQService to get a more in dept error message. See IQTrace Logs - not tracked for information to enable logging fro IQService.
To validate your question and what you want to do:
There is a domain account which is a member of a local ‘Administrators’ group. You want to remove the account from this group.
A domain account does not exist locally on a system (only a profile if the user has logged on), the system is using the domain for the authentication. So it is not possible to remove the account, since it is not there.
When a domain account been added to the local group : ADMINISTRATOR, During the UAR process for windows source, I excepted that IdentityNow removes the entitlement “ADMINISTRATOR” from the domain account.
I wonder how UAR / certification can be processed for those Identities who have their domain accounts on windows local group : ADMINISTRATOR.