text stringlengths 0 4.23k |
|---|
Syntax |
ksetup /changepassword <oldpassword> <newpassword> |
Parameters |
Parameter |
Description |
<oldpassword> |
Specifies the logged-on user's existing password. |
<newpassword> |
Specifies the logged on user's new password. This password must meet all the password requirements set on this computer. |
<oldpassword> |
<newpassword> |
Remarks |
If the user account isn't found in the current domain, the system will ask you to supply the domain name where the user account resides. |
If you want to force a password change at next logon, this command allows the use of the asterisk (*) so the user will be prompted for a new password. |
Examples |
To change the password of a user who is currently logged on to this computer in this domain, type: |
ksetup /changepassword Pas$w0rd Pa$$w0rd |
To change the password of a user who is currently logged on in the Contoso domain, type: |
ksetup /domain CONTOSO /changepassword Pas$w0rd Pa$$w0rd |
To force the currently logged on user to change the password at the next logon, type: |
ksetup /changepassword Pas$w0rd * |
ksetup delenctypeattr |
Removes the encryption type attribute for the domain. A status message is displayed upon successful or failed completion. |
You can view the encryption type for the Kerberos ticket-granting ticket (TGT) and the session key, by running the klist command and viewing the output. You can set the domain to connect to and use, by running the ksetup /domain <domainname> command. |
ksetup /domain <domainname> |
Syntax |
ksetup /delenctypeattr <domainname> |
Parameters |
Parameter |
Description |
<domainname> |
Name of the domain to which you want to establish a connection. You can use either the fully-qualified domain name or a simple form of the name, such as corp.contoso.com or contoso. |
<domainname> |
Examples |
To determine the current encryption types that are set on this computer, type: |
klist |
To set the domain to mit.contoso.com, type: |
ksetup /domain mit.contoso.com |
To verify what the encryption type attribute is for the domain, type: |
ksetup /getenctypeattr mit.contoso.com |
To remove the set encryption type attribute for the domain mit.contoso.com, type: |
ksetup /delenctypeattr mit.contoso.com |
ksetup delhosttorealmmap |
Removes a service principal name (SPN) mapping between the stated host and the realm. This command also removes any mapping between a host to realm (or multiple hosts to realm). |
The mapping is stored in the registry, under HKEY_LOCAL_MACHINE\SYSTEM\CurrentContolSet\Control\Lsa\Kerberos\HostToRealm. After running this command, we recommend making sure the mapping appears in the registry. |
HKEY_LOCAL_MACHINE\SYSTEM\CurrentContolSet\Control\Lsa\Kerberos\HostToRealm |
Syntax |
ksetup /delhosttorealmmap <hostname> <realmname> |
Parameters |
Parameter |
Description |
<hostname> |
Specifies the fully-qualified domain name of the computer. |
<realmname> |
Specifies the uppercase DNS name, such as CORP.CONTOSO.COM. |
<hostname> |
<realmname> |
Examples |
To change the configuration of the realm CONTOSO, and to delete the mapping of the host computer IPops897 to the realm, type: |
ksetup /delhosttorealmmap IPops897 CONTOSO |
ksetup delkdc |
Deletes instances of Key Distribution Center (KDC) names for the Kerberos realm. |
The mapping is stored in the registry, under HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\LSA\Kerberos\Domains. After running this command, we recommend making sure the KDC was removed and no longer appears in the list. |
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\LSA\Kerberos\Domains |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.