Topics: |
How to: |
The Windows machine must be located in the same domain where Kerberos is installed. The machine must have delegation enabled in the Domain Controller.
You can modify the Windows registry to obtain a ticket, otherwise goes to the Local Security (LSA)
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Lsa\Kerberos\Parameters Value Name: allowtgtsessionkey Value Type: REG_DWORD Value: 0x01
To access Environmental Variables, right-click the Windows 10 Start menu, click Control Panel, select System, click Advanced system settings, and then click Environmental Variables.
You can set the following values as SYSTEM Variables:
KRB5_CONFIG = path to krb.ini KRB5_TRACE = /dev/stdout
You must shut down and then start your Windows machine after making this change. Do not restart your machine.
Perform the following steps for easier connection confirmation during testing:
A Kerberos icon will appear on your desktop after restarting your machine.
If all server configurations are complete, a Kerberos ticket will be obtained and will appear in the dialog windows as userid@domain.suffix (user principal name format).
The ktpass command is used to create a keytab from the Domain Controller only. To create a keytab:
ktpass /princ myuser@REALM1.REALM2.COM /pass pass /ptype KRB5_NT_PRINCIPAL /crypto AES256-SHA1 /kvno 1 /out out.keytab
Note: The principal is the name of the user ID where the service principal name is mapped.
where:
Is a real user name that you can use.
Can be renamed to a real realm name and must only be one level or multiple levels deep.
Is a real password that you can enter.
The name of the keytab or name to use for the keytab. Do not use the /mapuser switch because it will overwrite the user principal name in the user account with what is entered after the switch. The principal name in the keytab must exactly match the real account credential name. If you skip this flag and ignore the warning, the Service Principal Name will carry the mapping between principal and user.
Can be one of the following:
Note: AES-128 or AES-256 are recommended for highest security. Check with the Active Directory administrator for the highest level supported.
You can map a drive using Windows Explorer and download the keytab to the windows client machine that will use the keytab. A keytab is not specific to a machine, but to a domain.