This error means Active Directory cannot automatically generate a Service Principal Name (SPN) for a target server because the server object in the directory lacks a
In plain terms:
“AD doesn’t know which server object to use for Kerberos authentication — the reference link is missing.”
This is a schema/attribute-level integrity issue, not a permissions, replication, or network problem.
“I can’t figure out the SPN because the server object isn’t properly linked — check the
Step 2: Determine correct
Step 3: Update or restore the
serverReference attribute. SPNs are required for Kerberos mutual authentication, and without serverReference, the DC cannot determine the proper SPN.In plain terms:
“AD doesn’t know which server object to use for Kerberos authentication — the reference link is missing.”
This is a schema/attribute-level integrity issue, not a permissions, replication, or network problem.
Error code equivalence (same error, different formats)
| Format | Code |
|---|---|
| Win32 (decimal) | 8589 |
| Win32 (hex) | 0x218D |
| HRESULT | 0x8007218D |
| Symbolic name | ERROR_DS_CANT_DERIVE_SPN_WITHOUT_SERVER_REF |
| Message | The DS cannot derive a service principal name (SPN) because the corresponding server object has no serverReference attribute. |
What this error really means
Active Directory relies on server objects to:- Represent physical or virtual servers in the domain
- Track Kerberos SPNs for mutual authentication
- Maintain linked attributes (
serverReference) for thecomputerorserverobject
serverReference is missing:- AD cannot determine the correct SPN
- Kerberos authentication fails
- Certain replication or remote operations may fail
“I can’t figure out the SPN because the server object isn’t properly linked — check the
serverReference attribute.”Common real-world scenarios that trigger this error
1) Restored or migrated server objects
Cause- Server object was restored from backup or imported without
serverReference - Linked attributes did not replicate properly
- SPN-related errors in Event Viewer
- Kerberos authentication to the server fails
- Object appears in ADUC but lacks proper attributes
2) Schema or replication inconsistencies
Cause- DC replication issues
- Linked attribute did not replicate
- Only one DC shows the error
repadmin /showobjmetareveals missingserverReference
3) Manual AD modifications or automation errors
Cause- Scripts created server objects without linking to
serverReference - Third-party tools modifying AD schema incorrectly
- Newly added server objects cannot authenticate with Kerberos
- SPN generation fails
4) Domain controller promotion issues
Cause- New DC added via DCPromo
- Server object did not receive a proper
serverReferencelink
- DC cannot authenticate with other DCs
- SPN-related errors in
Event Viewer→SystemorDirectory Servicelogs
What this error is NOT
Not a permission issue
Not DNS or network related
Not transient — requires attribute fix
Real fixes & solutions (correct order matters)
Step 1: Identify the affected server object
- Use ADUC or PowerShell:
Code:
Get-ADComputer -Identity <ServerName> -Properties serverReference
- Confirm whether
serverReferenceis populated
Step 2: Determine correct serverReference
- The
serverReferenceattribute should point to the server object that represents the physical or virtual host - Typically, this is automatically set during DC promotion or object creation
Step 3: Update or restore the serverReference attribute
- Use ADSI Edit or PowerShell to link the attribute:
Code:
Set-ADComputer -Identity <ServerName> -Add @{serverReference="CN=<ServerObject>,CN=Servers,CN=<Site>,CN=Sites,CN=Configuration,DC=domain,DC=com"}
- Ensure DN is correct and exists in AD
⚠ Warning: Incorrect edits in ADSI Edit can corrupt AD objects. Backup first.
Step 4: Validate SPN generation
- After updating
serverReference, SPNs should be derivable:
Code:
Set-ADComputer -Identity <ServerName> -ServicePrincipalNames @("HOST/<ServerName>","HOST/<ServerFQDN>")
- Use
setspn -L <ServerName>to verify SPNs
Step 5: Test Kerberos authentication
- From client or another DC:
Code:
klist purge
klist tickets
- Ensure Kerberos tickets are generated for the server
- Verify mutual authentication succeeds
Step 6: Ensure replication consistency
- Run:
Code:
repadmin /showrepl
dcdiag /v
- Confirm that
serverReferenceand SPNs replicate to all DCs
Fast “symptom → fix” mapping
- Kerberos authentication fails for server → Check
serverReference→ Restore or link correctly - DCPromo or new DC SPN issues → Verify server object attributes
- Replication inconsistencies → Ensure attribute replicates across DCs
Related schema and SPN errors (context map)
| Code / HRESULT | Meaning |
|---|---|
8589 (0x218D) | Cannot derive SPN without serverReference (this error) |
8547 (0x2163) | GC required |
8571 (0x217B) | Name not unique |
8553 (0x2169) | Cannot create in non-domain NC |
8534 (0x2156) | Source domain not in same forest |
Practical diagnostic checklist
- Does the server object exist in AD?
- Is
serverReferencepopulated correctly? - Are SPNs registered for the server?
- Has replication propagated the attribute to all DCs?
- Are Kerberos tickets being issued correctly after fix?
Note
ERROR_DS_CANT_DERIVE_SPN_WITHOUT_SERVER_REF is an attribute integrity enforcement error.- SPN generation depends on the
serverReferenceattribute. - The fix is to populate or restore
serverReferencecorrectly, verify SPNs, and ensure replication across DCs.
serverReference exists and SPNs are registered, Kerberos authentication succeeds immediately.