text stringlengths 0 4.23k |
|---|
Remarks |
If no parameters are provided, klist retrieves all the tickets for the currently logged on user. |
The parameters display the following information: |
tickets - Lists the currently cached tickets of services that you have authenticated to since logon. Displays the following attributes of all cached tickets: |
LogonID: The LUID. |
Client: The concatenation of the client name and the domain name of the client. |
Server: The concatenation of the service name and the domain name of the service. |
KerbTicket Encryption Type: The encryption type that is used to encrypt the Kerberos ticket. |
Ticket Flags: The Kerberos ticket flags. |
Start Time: The time from which the ticket is valid. |
End Time: The time the ticket becomes no longer valid. When a ticket is past this time, it can no longer be used to authenticate to a service or be used for renewal. |
Renew Time: The time that a new initial authentication is required. |
Session Key Type: The encryption algorithm that is used for the session key. |
tgt - Lists the initial Kerberos TGT and the following attributes of the currently cached ticket: |
LogonID: Identified in hexadecimal. |
ServiceName: krbtgt |
TargetName <SPN>: krbtgt |
<SPN> |
DomainName: Name of the domain that issues the TGT. |
TargetDomainName: Domain that the TGT is issued to. |
AltTargetDomainName: Domain that the TGT is issued to. |
Ticket Flags: Address and target actions and type. |
Session Key: Key length and encryption algorithm. |
StartTime: Local computer time that the ticket was requested. |
EndTime: Time the ticket becomes no longer valid. When a ticket is past this time, it can no longer be used to authenticate to a service. |
RenewUntil: Deadline for ticket renewal. |
TimeSkew: Time difference with the Key Distribution Center (KDC). |
EncodedTicket: Encoded ticket. |
purge - Allows you to delete a specific ticket. Purging tickets destroys all tickets that you have cached, so use this attribute with caution. It might stop you from being able to authenticate to resources. If this happens, you'll have to log off and log on again. |
sessions - Allows you to list and display the information for all logon sessions on this computer. |
kcd_cache - Allows you to display the Kerberos constrained delegation cache information. |
get - Allows you to request a ticket to the target that is specified by the SPN. |
LogonID: If specified, requests a ticket by using the logon session by the given value. If not specified, requests a ticket by using the current user's logon session. |
kdcoptions: Requests a ticket with the given KDC options |
add_bind - Allows you to specify a preferred domain controller for Kerberos authentication. |
query_bind - Allows you to display cached, preferred domain controllers for the domains. |
purge_bind - Allows you to remove cached, preferred domain controllers for the domains. |
kdcoptions - For the current list of options and their explanations, see RFC 4120. |
Examples |
To query the Kerberos ticket cache to determine if any tickets are missing, if the target server or account is in error, or if the encryption type is not supported due to an Event ID 27 error, type: |
klist |
klist –li 0x3e7 |
To learn about the specifics of each ticket-granting-ticket that is cached on the computer for a logon session, type: |
klist tgt |
To purge the Kerberos ticket cache, log off, and then log back on, type: |
klist purge |
klist purge –li 0x3e7 |
To diagnose a logon session and to locate a logonID for a user or a service, type: |
klist sessions |
To diagnose Kerberos constrained delegation failure, and to find the last error that was encountered, type: |
klist kcd_cache |
To diagnose if a user or a service can get a ticket to a server, or to request a ticket for a specific SPN, type: |
klist get host/%computername% |
To diagnose replication issues across domain controllers, you typically need the client computer to target a specific domain controller. To target the client computer to the specific domain controller, type: |
klist add_bind CONTOSO KDC.CONTOSO.COM |
klist add_bind CONTOSO.COM KDC.CONTOSO.COM |
To query which domain controllers were recently contacted by this computer, type: |
klist query_bind |
To rediscover domain controllers, or to flush the cache before creating new domain controller bindings with klist add_bind, type: |
klist add_bind |
klist purge_bind |
ksetup addenctypeattr |
Adds the encryption type attribute to the list of possible types for the domain. A status message is displayed upon successful or failed completion. |
Syntax |
ksetup /addenctypeattr <domainname> {DES-CBC-CRC | DES-CBC-MD5 | RC4-HMAC-MD5 | AES128-CTS-HMAC-SHA1-96 | AES256-CTS-HMAC-SHA1-96} |
Parameters |
Parameter |
Description |
<domainname> |
Name of the domain to which you want to establish a connection. Use the fully qualified domain name or a simple form of the name, such as corp.contoso.com or contoso. |
encryption type |
Must be one of the following supported encryption types:DES-CBC-CRCDES-CBC-MD5RC4-HMAC-MD5AES128-CTS-HMAC-SHA1-96AES256-CTS-HMAC-SHA1-96 |
<domainname> |
Remarks |
Examples |
To view the encryption type for the Kerberos ticket-granting ticket (TGT) and the session key, type: |
klist |
To set the domain to corp.contoso.com, type: |
ksetup /domain corp.contoso.com |
To add the encryption type AES-256-CTS-HMAC-SHA1-96 to the list of possible types for the domain corp.contoso.com, type: |
ksetup /addenctypeattr corp.contoso.com AES-256-CTS-HMAC-SHA1-96 |
To set the encryption type attribute to AES-256-CTS-HMAC-SHA1-96 for the domain corp.contoso.com, type: |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.