Hello,
Summary:
I have a newly built Server 2012 R2 box that I would like to rename and join to the domain. Maybe I am not grasping what needs to be done. I have research google and found to use certificates and followed. But, I must be missing something, or not understanding what needs to be done.
Error: Convertto-MOFInstance: System.InvalidOperationException error processing property ‘Credential’ of TYPE ‘xComputer’ : Converting and storing encrypted passwords as plain text is not recommended.
Mode: Push (will be pull after I get a better understanding of DSC)
I have been following the following: , but I believe I am mis-understanding something in it.
Code:
Configuration RenameJoinComputer { param ( [Parameter(Mandatory=$true)] [string]$Domain, [Parameter(Mandatory=$true)] [PSCredential]$DomainCred ) Import-DscResource -ModuleName xComputerManagement Node "OMA01P12SIB01" { xComputer ChangeDomain { Name = "OMA01P12SIB01" DomainName = $Domain Credential = $DomainCred } } $Configuration = @{ AllNodes = @( @{ NodeName = "OMA01P12SIB01" PsDSCAllowplaintextpassword = $true CertificateFile = "E:\Certificates\targetnode.cer" Thumbprint = "AD6127D13F564CA570A0422D4F089B308E119F6C" } ) } } RenameJoinComputer -Domain 'contoso.com' -DomainCred (Get-Credential) -ConfigurationData $Configuration -OutputPath "E:\DSC MOF" # SIG # Begin signature block # MIIIPwYJKoZIhvcNAQcCoIIIMDCCCCwCAQExCzAJBgUrDgMCGgUAMGkGCisGAQQB # gjcCAQSgWzBZMDQGCisGAQQBgjcCAR4wJgIDAQAABBAfzDtgWUsITrck0sYpfvNR # AgEAAgEAAgEAAgEAAgEAMCEwCQYFKw4DAhoFAAQUCoZkVoIIj48ML02NHinMYJrk # 3NCgggWgMIIFnDCCBISgAwIBAgITbQAAAAYgad07WR+HSAAAAAAABjANBgkqhkiG # 9w0BAQUFADBRMRMwEQYKCZImiZPyLGQBGRYDaWNtMRcwFQYKCZImiZPyLGQBGRYH # YXJtd2VzdDEhMB8GA1UEAxMYYXJtd2VzdC1PTUEwMVAxMkRTQzAxLUNBMB4XDTE2 # MTIwMTE2MDcxMloXDTE3MTIwMTE2MDcxMlowVTETMBEGCgmSJomT8ixkARkWA2lj # bTEXMBUGCgmSJomT8ixkARkWB2FybXdlc3QxDjAMBgNVBAMTBVVzZXJzMRUwEwYD # VQQDEwxKYW1lcyBLcnVzaWMwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQCD19lZf2Oo0qe0+P94vT+migVIzCa1zo5uTmid4XVqOQmijU9fP3IHOxVNSOF/ # ++AgiyO5LoWfWJZ6onTrrFbmUmummrrkolAC3r/leNiatXecr5lwzoxll5X2A73H # ObMdECp6boUeCDWptLndkmR/DQboyHdcK/3bq9xR0TZVX/PZOZV66RIe57qQZzt6 # pzxMFRKw3cRJwyxxdqGAdVRXkV/AF8m1fn52rflNf7pzs1P7Jx9VWDooaZZEV0UG # ki7qdmAvay8x7PWnxebuyhuV030/xJ30/MZN5XqhCulfJH3gOXurneWPF466/oSX # hBKOnZMsDoEswSFUxKU+6XjJAgMBAAGjggJnMIICYzAlBgkrBgEEAYI3FAIEGB4W # AEMAbwBkAGUAUwBpAGcAbgBpAG4AZzATBgNVHSUEDDAKBggrBgEFBQcDAzAOBgNV # HQ8BAf8EBAMCB4AwHQYDVR0OBBYEFMpapVPuWKXrI1xJM2EJCoEvql3aMB8GA1Ud # IwQYMBaAFEduaBcWLjD/tW84jPnKK5KgQr47MIHYBgNVHR8EgdAwgc0wgcqggceg # gcSGgcFsZGFwOi8vL0NOPWFybXdlc3QtT01BMDFQMTJEU0MwMS1DQSxDTj1PTUEw # MVAxMkRTQzAxLENOPUNEUCxDTj1QdWJsaWMgS2V5IFNlcnZpY2VzLENOPVNlcnZp # Y2VzLENOPUNvbmZpZ3VyYXRpb24sREM9YXJtd2VzdCxEQz1pY20/Y2VydGlmaWNh # dGVSZXZvY2F0aW9uTGlzdD9iYXNlP29iamVjdENsYXNzPWNSTERpc3RyaWJ1dGlv # blBvaW50MIHGBggrBgEFBQcBAQSBuTCBtjCBswYIKwYBBQUHMAKGgaZsZGFwOi8v # L0NOPWFybXdlc3QtT01BMDFQMTJEU0MwMS1DQSxDTj1BSUEsQ049UHVibGljIEtl # eSBTZXJ2aWNlcyxDTj1TZXJ2aWNlcyxDTj1Db25maWd1cmF0aW9uLERDPWFybXdl # c3QsREM9aWNtP2NBQ2VydGlmaWNhdGU/YmFzZT9vYmplY3RDbGFzcz1jZXJ0aWZp # Y2F0aW9uQXV0aG9yaXR5MDEGA1UdEQQqMCigJgYKKwYBBAGCNxQCA6AYDBZzYV9q # a3J1c2ljQGFybXdlc3QuaWNtMA0GCSqGSIb3DQEBBQUAA4IBAQBxxJI4FUw3BDko # EtEJV99Oa64H4ZPrfV9fHRL7F2Xa78vuN7mWVzAtpISzl5PRTNEGmgfgD2iw8G1q # Y6IWvtF/v1axL0z2LwqeK+7rClvrLm8BYHQ/1pgjyASB/ivNXe5A1Ok5zAkG7vMD # jZSIeiyDBTZg9Z8X7U2VArM9Jkz18+blS6PpBWu/Aw3rDv67kLx2ZLS1mz4eNdG9 # r3C4c1c/lMt3BwaWdOFl8DLtaitFGlR3UxEdqj3Ox3OrOGgdZVYJikFoLcz3XyB3 # +AzjXmbYUWax+ysC4FO6hwY2pemK7ti39ymcWQhQuai2nRhcXkAuupB4qOE7vvfN # /WUHZhCGMYICCTCCAgUCAQEwaDBRMRMwEQYKCZImiZPyLGQBGRYDaWNtMRcwFQYK # CZImiZPyLGQBGRYHYXJtd2VzdDEhMB8GA1UEAxMYYXJtd2VzdC1PTUEwMVAxMkRT # QzAxLUNBAhNtAAAABiBp3TtZH4dIAAAAAAAGMAkGBSsOAwIaBQCgeDAYBgorBgEE # AYI3AgEMMQowCKACgAChAoAAMBkGCSqGSIb3DQEJAzEMBgorBgEEAYI3AgEEMBwG # CisGAQQBgjcCAQsxDjAMBgorBgEEAYI3AgEVMCMGCSqGSIb3DQEJBDEWBBTHZO93 # GC5DBTV1tXIx5X0a3XEowjANBgkqhkiG9w0BAQEFAASCAQACUW7JHQHAby7mrMgS # +QAm0pUrSzXmsUxu5lqaB8QZhZJbg6qzUJ7ppXfQS0KQGz+qQXWKXIgA6y9QDy6M # D3mYN15lZC4VFp6xbS0OpLs6HVbXvrGiYS5iqt+LzFr2+gFW0Th/vvKKuplUEVa4 # dyFd0uxHZzEXKRWEC1Or/wKyp1Q66eD5xzPv4iHVN1OdaJmQUP1mVHPcKVhML0eC # /sQZbmFSWjqYoI+6U3yiSTStaDHTt4x0xSAX5PaeWdLD3NunVO4kwFu9dUA5dLG8 # 4EO/5W4GCRosuHbfLmpcpAETexyLLR+EEA02lS2MnpwgUleFSELNNfo80gpygUlO # D90V # SIG # End signature block
Does the LCM on the Push Server need to be set to use the certificate? On the Target off domain server the Certificate is installed Personal and the root certificate in Trusted Root Certificate Authority store.