DSC xComputer | Join Domain

Hello,

Summary:
I have a newly built Server 2012 R2 box that I would like to rename and join to the domain. Maybe I am not grasping what needs to be done. I have research google and found to use certificates and followed. But, I must be missing something, or not understanding what needs to be done.

Error: Convertto-MOFInstance: System.InvalidOperationException error processing property ‘Credential’ of TYPE ‘xComputer’ : Converting and storing encrypted passwords as plain text is not recommended.

Mode: Push (will be pull after I get a better understanding of DSC)

I have been following the following: , but I believe I am mis-understanding something in it.

Code:

Configuration RenameJoinComputer {

    param (

    [Parameter(Mandatory=$true)]
    [string]$Domain,

    [Parameter(Mandatory=$true)]
    [PSCredential]$DomainCred

    )

   Import-DscResource -ModuleName xComputerManagement


    Node "OMA01P12SIB01"
    {
        xComputer ChangeDomain
        { 
            Name = "OMA01P12SIB01"
            DomainName = $Domain
            Credential = $DomainCred
        }

    }

$Configuration = @{
    AllNodes = @(
        @{
            NodeName             = "OMA01P12SIB01"
            PsDSCAllowplaintextpassword = $true
            CertificateFile = "E:\Certificates\targetnode.cer"
            Thumbprint = "AD6127D13F564CA570A0422D4F089B308E119F6C"
        }
    )
}

}

RenameJoinComputer -Domain 'contoso.com' -DomainCred (Get-Credential) -ConfigurationData $Configuration -OutputPath "E:\DSC MOF"

# SIG # Begin signature block
# MIIIPwYJKoZIhvcNAQcCoIIIMDCCCCwCAQExCzAJBgUrDgMCGgUAMGkGCisGAQQB
# gjcCAQSgWzBZMDQGCisGAQQBgjcCAR4wJgIDAQAABBAfzDtgWUsITrck0sYpfvNR
# AgEAAgEAAgEAAgEAAgEAMCEwCQYFKw4DAhoFAAQUCoZkVoIIj48ML02NHinMYJrk
# 3NCgggWgMIIFnDCCBISgAwIBAgITbQAAAAYgad07WR+HSAAAAAAABjANBgkqhkiG
# 9w0BAQUFADBRMRMwEQYKCZImiZPyLGQBGRYDaWNtMRcwFQYKCZImiZPyLGQBGRYH
# YXJtd2VzdDEhMB8GA1UEAxMYYXJtd2VzdC1PTUEwMVAxMkRTQzAxLUNBMB4XDTE2
# MTIwMTE2MDcxMloXDTE3MTIwMTE2MDcxMlowVTETMBEGCgmSJomT8ixkARkWA2lj
# bTEXMBUGCgmSJomT8ixkARkWB2FybXdlc3QxDjAMBgNVBAMTBVVzZXJzMRUwEwYD
# VQQDEwxKYW1lcyBLcnVzaWMwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQCD19lZf2Oo0qe0+P94vT+migVIzCa1zo5uTmid4XVqOQmijU9fP3IHOxVNSOF/
# ++AgiyO5LoWfWJZ6onTrrFbmUmummrrkolAC3r/leNiatXecr5lwzoxll5X2A73H
# ObMdECp6boUeCDWptLndkmR/DQboyHdcK/3bq9xR0TZVX/PZOZV66RIe57qQZzt6
# pzxMFRKw3cRJwyxxdqGAdVRXkV/AF8m1fn52rflNf7pzs1P7Jx9VWDooaZZEV0UG
# ki7qdmAvay8x7PWnxebuyhuV030/xJ30/MZN5XqhCulfJH3gOXurneWPF466/oSX
# hBKOnZMsDoEswSFUxKU+6XjJAgMBAAGjggJnMIICYzAlBgkrBgEEAYI3FAIEGB4W
# AEMAbwBkAGUAUwBpAGcAbgBpAG4AZzATBgNVHSUEDDAKBggrBgEFBQcDAzAOBgNV
# HQ8BAf8EBAMCB4AwHQYDVR0OBBYEFMpapVPuWKXrI1xJM2EJCoEvql3aMB8GA1Ud
# IwQYMBaAFEduaBcWLjD/tW84jPnKK5KgQr47MIHYBgNVHR8EgdAwgc0wgcqggceg
# gcSGgcFsZGFwOi8vL0NOPWFybXdlc3QtT01BMDFQMTJEU0MwMS1DQSxDTj1PTUEw
# MVAxMkRTQzAxLENOPUNEUCxDTj1QdWJsaWMgS2V5IFNlcnZpY2VzLENOPVNlcnZp
# Y2VzLENOPUNvbmZpZ3VyYXRpb24sREM9YXJtd2VzdCxEQz1pY20/Y2VydGlmaWNh
# dGVSZXZvY2F0aW9uTGlzdD9iYXNlP29iamVjdENsYXNzPWNSTERpc3RyaWJ1dGlv
# blBvaW50MIHGBggrBgEFBQcBAQSBuTCBtjCBswYIKwYBBQUHMAKGgaZsZGFwOi8v
# L0NOPWFybXdlc3QtT01BMDFQMTJEU0MwMS1DQSxDTj1BSUEsQ049UHVibGljIEtl
# eSBTZXJ2aWNlcyxDTj1TZXJ2aWNlcyxDTj1Db25maWd1cmF0aW9uLERDPWFybXdl
# c3QsREM9aWNtP2NBQ2VydGlmaWNhdGU/YmFzZT9vYmplY3RDbGFzcz1jZXJ0aWZp
# Y2F0aW9uQXV0aG9yaXR5MDEGA1UdEQQqMCigJgYKKwYBBAGCNxQCA6AYDBZzYV9q
# a3J1c2ljQGFybXdlc3QuaWNtMA0GCSqGSIb3DQEBBQUAA4IBAQBxxJI4FUw3BDko
# EtEJV99Oa64H4ZPrfV9fHRL7F2Xa78vuN7mWVzAtpISzl5PRTNEGmgfgD2iw8G1q
# Y6IWvtF/v1axL0z2LwqeK+7rClvrLm8BYHQ/1pgjyASB/ivNXe5A1Ok5zAkG7vMD
# jZSIeiyDBTZg9Z8X7U2VArM9Jkz18+blS6PpBWu/Aw3rDv67kLx2ZLS1mz4eNdG9
# r3C4c1c/lMt3BwaWdOFl8DLtaitFGlR3UxEdqj3Ox3OrOGgdZVYJikFoLcz3XyB3
# +AzjXmbYUWax+ysC4FO6hwY2pemK7ti39ymcWQhQuai2nRhcXkAuupB4qOE7vvfN
# /WUHZhCGMYICCTCCAgUCAQEwaDBRMRMwEQYKCZImiZPyLGQBGRYDaWNtMRcwFQYK
# CZImiZPyLGQBGRYHYXJtd2VzdDEhMB8GA1UEAxMYYXJtd2VzdC1PTUEwMVAxMkRT
# QzAxLUNBAhNtAAAABiBp3TtZH4dIAAAAAAAGMAkGBSsOAwIaBQCgeDAYBgorBgEE
# AYI3AgEMMQowCKACgAChAoAAMBkGCSqGSIb3DQEJAzEMBgorBgEEAYI3AgEEMBwG
# CisGAQQBgjcCAQsxDjAMBgorBgEEAYI3AgEVMCMGCSqGSIb3DQEJBDEWBBTHZO93
# GC5DBTV1tXIx5X0a3XEowjANBgkqhkiG9w0BAQEFAASCAQACUW7JHQHAby7mrMgS
# +QAm0pUrSzXmsUxu5lqaB8QZhZJbg6qzUJ7ppXfQS0KQGz+qQXWKXIgA6y9QDy6M
# D3mYN15lZC4VFp6xbS0OpLs6HVbXvrGiYS5iqt+LzFr2+gFW0Th/vvKKuplUEVa4
# dyFd0uxHZzEXKRWEC1Or/wKyp1Q66eD5xzPv4iHVN1OdaJmQUP1mVHPcKVhML0eC
# /sQZbmFSWjqYoI+6U3yiSTStaDHTt4x0xSAX5PaeWdLD3NunVO4kwFu9dUA5dLG8
# 4EO/5W4GCRosuHbfLmpcpAETexyLLR+EEA02lS2MnpwgUleFSELNNfo80gpygUlO
# D90V
# SIG # End signature block

Does the LCM on the Push Server need to be set to use the certificate? On the Target off domain server the Certificate is installed Personal and the root certificate in Trusted Root Certificate Authority store.

Resolved: I found the issue. I needed to point the LCM of the target computer to use the Certificate Thumbprint and execution the LCM configuration.

After that I just needed to run the DSC configuration.

Thank you