01-10-2011 03:13 PM - edited 03-16-2019 02:47 AM
Hi,
Need to perform some add moves and changes, but the customer does not have its Directoy Manager password anymore.
Tried all the know procedures by using the passwordutils and umencryptext tools, restarted dcdserver and iis, but still having problems.
Is there a tool available to reverse the hash generation of the passwordutils program?
Hope someone can give me a hand.
CUCM version is 4.3 and I do have administrative access on the Windows 2003 server.
Note that once I change the registery hashed and all other reference (and restored everything) I can not login to the admin pages anymore using ccmadministrator.
Kind regards!
Sijbren
01-10-2011 05:18 PM
There is a Cisco internal TAC tool for decrypting hashed DC Directory Administration passwords. I have sent you a private message.
Kind regards,
Craig
01-10-2011 10:37 PM
Hi
Customer does not have a support contract anymore and TAC is unwilling to help because of that.
Met vriendelijke groeten / with kind Regards,
Sijbren
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide