Platform SDK: Active Directory, ADSI, and Directory Services |
The DsWriteAccountSpn function writes an array of service principal names (SPNs) to the servicePrincipalName attribute of a specified user or computer account object in Active Directory™. The function can either register or unregister the SPNs.
DWORD DsWriteAccountSpn( HANDLE hDS, DS_SPN_WRITE_OP Operation, LPCTSTR pszAccount, DWORD cSpn, LPCTSTR *rpszSpn );
Value | Meaning |
---|---|
DS_SPN_ADD_SPN_OP | Adds the specified SPNs to the pszAccount account. |
DS_SPN_DELETE_SPN_OP | Deletes the specified SPNs from the pszAccount account. |
DS_SPN_REPLACE_SPN_OP | Removes all SPNs currently registered on the pszAccount account and replaces them with those specified in rpszSpn. |
If the function successfully registers one or more SPNs, it returns ERROR_SUCCESS. Modification is performed permissively, so that adding a value that already exists does not return an error.
The DsWriteAccountSpn function registers the SPNs for one or more instances of a service. SPNs are used by clients, in conjunction with a trusted authentication service, to authenticate the service. To protect against security attacks where an application or service fraudulently registers an SPN that identifies some other service, the default DACL on user and computer accounts only allows domain administrators to register SPNs in most cases.
The exception to this rule is that a service running under the LocalSystem account can call DsWriteAccountSpn to register a simple SPN of the form:
ServiceClass/ host: InstancePort
If the host specified in the SPN is the DNS or NetBIOS name of the computer on which the service is running.
SPNs passed to DsWriteAccountSpn are actually added to the Service-Principal-Name attribute of the computer object in pszAccount. This call is made using RPC to the domain controller where the account object is stored so it can securely enforce policy on what SPNs are allowed on the account. Using LDAP to write directly to the SPN property is not allowed; all writes must come through this RPC call. Reads using LDAP are permitted.
Windows NT/2000: Requires Windows 2000.
Header: Declared in Ntdsapi.h.
Library: Included as a resource in Ntdsapi.dll.
Unicode: Implemented as Unicode and ANSI versions on Windows 2000.
DC and Replication Management Functions, DsBind, DsBindWithCred, DsGetSpn