KB5082063 is not mentioned in the provided context, but there is closely related information about Windows updates causing domain sign‑in and Kerberos authentication issues, especially for specific account types after recent security updates.
From the context, the most relevant pattern is:
- After certain security updates on domain controllers, Kerberos authentication can fail selectively (for example, for domain users, gMSA, or specific accounts) while others continue to work.
- The known issues for the November 8, 2022 security‑only updates describe scenarios where:
- Domain user sign‑in can fail.
- Remote Desktop connections using domain users can fail.
- The error is tied to Kerberos keys after password changes, and resetting the password regenerates a suitable key.
In those cases, the System event log on the domain controller shows Microsoft‑Windows‑Kerberos‑Key‑Distribution‑Center Event ID 4 with text similar to:
While processing an AS request for target service <service>, the account <account name> did not have a suitable key for generating a Kerberos ticket (the missing key has an ID of 1). The requested etypes : 18 3. The accounts available etypes : 23 18 17. Changing or resetting the password of <account name> will generate a proper key.
And the issue is resolved by installing the corresponding follow‑up update (for those specific KBs) or by resetting the affected account’s password so that a proper key is generated.
Based on that pattern, the concrete steps that align with the documented behavior are:
- On a working machine (or via out‑of‑band access such as another DC or management console), open Event Viewer on the domain controller where sign‑in is failing and check:
- Event Viewer → Windows Logs → System
- Look for Microsoft‑Windows‑Kerberos‑Key‑Distribution‑Center Event ID 4 entries around the time of failed administrator sign‑ins.
- If the event text includes “the missing key has an ID of 1” and mentions the administrator account, this matches the known Kerberos key issue.
- If that event pattern is present, follow the documented remediation pattern:
- Change or reset the password of the affected administrator account(s) so that a new Kerberos key is generated.
- After the password reset, attempt sign‑in again (both local console and RDP) using the new password.
- If the environment is running a security‑only or cumulative update set similar to those described (where a follow‑up KB is provided to fix Kerberos issues), install the corresponding fix update for the platform once it is available for the specific build. In the documented cases, Microsoft addressed the issue with follow‑up updates such as KB5021657, KB5021652, and KB5021651 for the November 8, 2022 updates.
- If sign‑in is still not possible for administrator accounts after password reset and there is no Event ID 4 with “the missing key has an ID of 1,” use out‑of‑band management (for example, console/iLO/DRAC/Hyper‑V/VMware console) to:
- Verify that the update is indeed the only recent change.
- Check whether uninstalling the problematic update from the domain controller is possible and supported in the environment, then reboot and test sign‑in again.
Because regular user sign‑in still works, focus on:
- Kerberos key issues specific to the administrator accounts (password reset to regenerate keys).
- Event ID 4 diagnostics on the domain controller.
- Applying any follow‑up fix update from Microsoft that specifically addresses Kerberos/sign‑in regressions for the same update train as KB5082063.
If the server is completely inaccessible via normal sign‑in, use directory tools from another domain controller or management workstation (for example, Active Directory Users and Computers) to reset the administrator account password and then test again.
References: