Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

MSFT:53847109 [.NET Core] DTS / UserPrincipal.GetAuthorizationGroups returns PrincipalOperationException: Information about the domain could not be retrieved (1212). #108032

Open
wants to merge 2 commits into
base: main
Choose a base branch
from

Conversation

kumarravik78c
Copy link
Member

UserPrincipal.GetAuthorizationGroups function returns exception when kerberos FAST is enabled which another security functionality. When FAST is enabled, the dot-net code does an additional domain look up with domainname "NT Authority" which is invalid since the domainname should not have a space in it. We are adding a check if the SID is sentinel type which meand that the sid is of the following Type then we do not do another domain look up.

Sentinel SID: S-1-5-21-X-Y-Z-R means that the SID belongs to a domain (including the local account domain) unless X=Y=Z=0 in which case it’s a sentinel SID, a special type of pseudo-object that can’t be interpreted in isolation.

@dotnet-policy-service dotnet-policy-service bot added the community-contribution Indicates that the PR has been added by a community member label Sep 19, 2024
Copy link
Contributor

Tagging subscribers to this area: @dotnet/area-system-directoryservices, @jay98014
See info in area-owners.md if you want to be subscribed.

@kumarravik78c
Copy link
Member Author

@dotnet-policy-service agree company="Microsoft"

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
area-System.DirectoryServices community-contribution Indicates that the PR has been added by a community member
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants