So I am not any closer locally, but we have narrowed the issue down to Server 2025, so I installed the Microsoft Exchange Management Tools on Server 2019, and then performed an in place upgrade and the tools broke, so I removed them and reinstalled them again, and the exact same behavior started where I could run the Exchange Management Tools remotely like I was prior to upgrade the Server OS. So I went to another server, one running Windows Server 2022, installed the tools and also noted that I could run the tools remotely, with some additional troubleshooting, I was able to get error output that pointed to the following:
Mail flow test: [EXCHANGE_SERVER] Connecting to remote server EXCHANGE_SERVER failed with the following error message : The WinRM client cannot process the request. A computer policy does not allow the delegation of the user credentials to the target computer because the computer is not trusted. The identity of the target computer can be verified if you configure the WSMAN service to use a valid certificate using the following command: winrm set winrm/config/service '@{CertificateThumbprint="<thumbprint>"}'Ā Or you can check the Event Viewer for an event that specifies that the following SPN could not be created: WSMAN/<computerFQDN>. If you find this event, you can manually create the SPN using setspn.exe .Ā If the SPN exists, but CredSSP cannot use Kerberos to validate the identity of the target computer and you still want to allow the delegation of the user credentials to the target computer, use gpedit.msc and look at the following policy: Computer Configuration -> Administrative Templates -> System -> Credentials Delegation -> Allow Fresh Credentials with NTLM-only Server Authentication.Ā Verify that it is enabled and configured with an SPN appropriate for the target computer. For example, for a target computer name "myserver.domain.com", the SPN can be one of the following: WSMAN/myserver.domain.com or WSMAN/*.domain.com. Try the request again after these changes. For more information, see the about_Remote_Troubleshooting Help topic. Ā Ā + CategoryInfoĀ Ā Ā Ā Ā Ā Ā Ā Ā : OpenError: (EXCHANGE_SERVER:String) [], PSRemotingTransportException Ā Ā + FullyQualifiedErrorId : -2144108124,PSSessionStateBroken
Got a similar message with Computer Configuration -> Administrative Templates -> System -> Credentials Delegation -> Allow Fresh Credentials, as well. So we updated the Group Policy on the remote server for allowing those two settings on the Exchange_Server i.e. WSMAN/Exchange_Server and WSMAN/Exchange_Server.domain.com
Then I could successfully connect remotely to the newer Exchange SE server. Still can't connect locally, but remotely is working on a Server 2022 and Server 2025 box remotely using Kerberos security.
This error is a textbook example of the Kerberos double-hop issue, which occurs when you're trying to pass credentials across two hops in a network using Windows Remote Management (WinRM) and Kerberos authentication.
Letās break it down:
What Is the Double-Hop Problem?
In a typical remote PowerShell or WinRM session:
- First hop: You connect from your client machine to a remote server (e.g.,
EXCHANGE
) using Kerberos.
- Second hop: That remote server then tries to access another resource (like Active Directory, a file share, or another server) on your behalf, using your credentials.
Kerberos by default does not allow credential delegation across that second hop unless explicitly configured. So when the remote server tries to use your credentials to authenticate to another system, it failsābecause it doesnāt have permission to "re-use" your credentials.
Why Your Error Message Confirms It
The error says:
"A computer policy does not allow the delegation of the user credentials to the target computer because the computer is not trusted."
This is Kerberos saying: āI wonāt let this server use your credentials to talk to another server unless youāve configured delegation properly.ā
It also references:
- SPNs (Service Principal Names): Required for Kerberos to identify services.
- CredSSP and NTLM fallback: Workarounds that allow credential delegation in less secure ways.
- Group Policy settings: Specifically the
Allow Fresh Credentials with NTLM-only Server Authentication
policy, which can bypass the double-hop restriction under certain conditions.
How to Fix or Work Around It
Here are your main options:
ā
1. Configure Kerberos Delegation
- Use Constrained Delegation in Active Directory.
- Ensure the SPN for the target service (e.g.,
WSMAN/exchange.domain.com
) is properly registered.
- Set up delegation on the account or computer object in AD to allow it to delegate credentials to the target service.
ā
2. Use CredSSP
- CredSSP allows credentials to be passed securely to the remote server.
- Enable via Group Policy:
Computer Configuration ā Administrative Templates ā System ā Credentials Delegation ā Allow Fresh Credentials with NTLM-only Server Authentication
- Add the target serverās SPN to the allowed list.
ā
3. Use HTTPS for WinRM
- Configure WinRM to use a valid certificate.
- This can help bypass some of the trust issues by validating the identity of the remote server.
Why It Matters
Without resolving the double-hop issue, any script or tool that relies on remote execution and tries to access another resource (like Exchange or AD) will fail silently or throw credential errorsāeven if everything else looks correctly configured.
Let me know if you want help walking through the delegation setup or testing SPNs. This oneās tricky, but once itās nailed down, it unlocks a lot of automation potential.This error is a textbook example of the Kerberos double-hop issue, which occurs when you're trying to pass credentials across two hops in a network using Windows Remote Management (WinRM) and Kerberos authentication.
Letās break it down:
š§ What Is the Double-Hop Problem?
In a typical remote PowerShell or WinRM session:
- First hop: You connect from your client machine to a remote server (e.g.,
EXCHANGE
) using Kerberos.
- Second hop: That remote server then tries to access another resource (like Active Directory, a file share, or another server) on your behalf, using your credentials.
Kerberos by default does not allow credential delegation across that second hop unless explicitly configured. So when the remote server tries to use your credentials to authenticate to another system, it failsābecause it doesnāt have permission to "re-use" your credentials.
Why Your Error Message Confirms It
The error says:
"A computer policy does not allow the delegation of the user credentials to the target computer because the computer is not trusted."
This is Kerberos saying: āI wonāt let this server use your credentials to talk to another server unless youāve configured delegation properly.ā
It also references:
- SPNs (Service Principal Names): Required for Kerberos to identify services.
- CredSSP and NTLM fallback: Workarounds that allow credential delegation in less secure ways.
- Group Policy settings: Specifically the
Allow Fresh Credentials with NTLM-only Server Authentication
policy, which can bypass the double-hop restriction under certain conditions.
How to Fix or Work Around It
Here are your main options:
ā
1. Configure Kerberos Delegation
- Use Constrained Delegation in Active Directory.
- Ensure the SPN for the target service (e.g.,
WSMAN/exchange.domain.com
) is properly registered.
- Set up delegation on the account or computer object in AD to allow it to delegate credentials to the target service.
ā
2. Use CredSSP
- CredSSP allows credentials to be passed securely to the remote server.
- Enable via Group Policy:
Computer Configuration ā Administrative Templates ā System ā Credentials Delegation ā Allow Fresh Credentials with NTLM-only Server Authentication
- Enable via Group Policy:
Computer Configuration ā Administrative Templates ā System ā Credentials Delegation ā Allow Fresh Credentials
- Add the target serverās SPN to the allowed list.
ā
3. Use HTTPS for WinRM
- Configure WinRM to use a valid certificate.
- This can help bypass some of the trust issues by validating the identity of the remote server.
So I am getting closer to the issue, but it is pointing to Server 2025 having stricter Kerberos enforcement defaults is my current path of troubleshooting.