I'm using local accounts (servers in different workgroups) with the same name/password, and I've configured the ms-DSReplAuthenticationMode==0 and applied the appropriate hotfix to the Windows 2003 servers.
I've disabled the publishing of Service Connection Points and this isn't a domain, so SPNs aren't relevant here either.
The article you linked to states that they resolved a similar issue to mine by adding the LDS service account to the local administrators group, but that's never going to fly in an enterprise deployment, so it looks like they weren't able to determine what
caused their issue either.
5. Membership of the local Administrators group.
At the time of writing, the AD LDS product documentation indicates that the service account is not required to be a member of the local Administrators group on server running the AD LDS instance. However, my experience is that without this, the following error is generated in the event log corresponding to the instance each time the service is re-started.
Log Name: ADAM (instance1)
Source: ADAM [instance1] General
Date: 6/04/2009 11:22:08 a.m.
Event ID: 1168
Task Category: Internal Processing
Level: Error
Keywords: Classic
User: ANONYMOUS LOGON
Computer: ADLDS1.widget.com
Description:
Internal error: An Active Directory Lightweight Directory Services error has occurred.
Additional Data
Error value (decimal):
-1073741790
Error value (hex):
c0000022
Internal ID:
3000715
The fact that the service account requires membership of the local Administrators group makes the choice to use Network Service even more compelling. The Network Service account has a lower level of privilege on the local machine than that of members of the Administrators group. This implies the potential for compromise is lower when using Network Service.
Does anyone know what these error messages are actually complaining about?