text stringlengths 0 4.23k |
|---|
ksetup /setenctypeattr corp.contoso.com AES-256-CTS-HMAC-SHA1-96 |
To verify that the encryption type attribute was set as intended for the domain, type: |
ksetup /getenctypeattr corp.contoso.com |
ksetup addhosttorealmmap |
Adds a service principal name (SPN) mapping between the stated host and the realm. This command also allows you to map a host or multiple hosts that are sharing the same DNS suffix to the realm. |
The mapping is stored in the registry, under HKEY_LOCAL_MACHINE\SYSTEM\CurrentContolSet\Control\Lsa\Kerberos\HostToRealm. |
Syntax |
ksetup /addhosttorealmmap <hostname> <realmname> |
Parameters |
Parameter |
Description |
<hostname> |
The host name is the computer name, and it can be stated as the computer's fully qualified domain name. |
<realmname> |
The realm name is stated as an uppercase DNS name, such as CORP.CONTOSO.COM. |
<hostname> |
<realmname> |
Examples |
To map the host computer IPops897 to the CONTOSO realm, type: |
ksetup /addhosttorealmmap IPops897 CONTOSO |
Check the registry to make sure the mapping occurred as intended. |
ksetup addkdc |
Adds a Key Distribution Center (KDC) address for the given Kerberos realm |
The mapping is stored in the registry, under HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\LSA\Kerberos\Domains and the computer must be restarted before the new realm setting will be used. |
Note |
To deploy Kerberos realm configuration data to multiple computers, you must use the Security Configuration Template snap-in and policy distribution, explicitly on individual computers. You can't use this command. |
Syntax |
ksetup /addkdc <realmname> [<KDCname>] |
Parameters |
Parameter |
Description |
<realmname> |
Specifies the uppercase DNS name, such as CORP.CONTOSO.COM. This value also appears as the default realm when ksetup is run, and is the realm to which you want to add the other KDC. |
<KDCname> |
Specifies the case-insensitive, fully-qualified domain name, such as mitkdc.contoso.com. If the KDC name is omitted, DNS will locate KDCs. |
<realmname> |
<KDCname> |
Examples |
To configure a non-Windows KDC server and the realm that the workstation should use, type: |
ksetup /addkdc CORP.CONTOSO.COM mitkdc.contoso.com |
To set the local computer account password to p@sswrd1% on the same computer as in the previous example, and then to restart the computer, type: |
ksetup /setcomputerpassword p@sswrd1% |
To verify the default realm name for the computer or to verify that this command worked as intended, type: |
ksetup |
Check the registry to make sure the mapping occurred as intended. |
ksetup addkpasswd |
Adds a Kerberos password (kpasswd) server address for a realm. |
Syntax |
ksetup /addkpasswd <realmname> [<kpasswdname>] |
Parameters |
Parameter |
Description |
<realmname> |
Specifies the uppercase DNS name, such as CORP.CONTOSO.COM, and is listed as the default realm or Realm= when ksetup is run. |
<kpasswdname> |
Specifies the Kerberos password server. It's stated as a case-insensitive, fully-qualified domain name, such as mitkdc.contoso.com. If the KDC name is omitted, DNS might be used to locate KDCs. |
<realmname> |
<kpasswdname> |
Remarks |
If the Kerberos realm that the workstation will be authenticating to supports the Kerberos change password protocol, you can configure a client computer running the Windows operating system to use a Kerberos password server. |
You can add additional KDC names one at a time. |
Examples |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.