text stringlengths 0 4.23k |
|---|
sendaddress |
The IP address will be included within the ticket-granting tickets. |
0x02 |
tcpsupported |
Both the Transmission Control Protocol (TCP) and the User Datagram Protocol (UDP) are supported in this realm. |
0x04 |
delegate |
Everyone in this realm is trusted for delegation. |
0x08 |
ncsupported |
This realm supports name canonicalization, which allows for DNS and Realm naming standards. |
0x80 |
rc4 |
This realm supports RC4 encryption to enable cross-realm trust, which allows for the use of TLS. |
Realm flags are stored in the registry under HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa\Kerberos\Domains\<realmname>. This entry doesn't exist in the registry by default. You can use the ksetup addrealmflags command to populate the registry. |
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa\Kerberos\Domains\<realmname> |
You can see the available and set realm flags by viewing the output of ksetup or ksetup /dumpstate. |
ksetup /dumpstate |
Examples |
To list the available realm flags for the realm CONTOSO, type: |
ksetup /listrealmflags |
To remove two flags currently in the set, type: |
ksetup /delrealmflags CONTOSO ncsupported delegate |
To verify the realm flags have been removed, type ksetup and then view the output, looking for the text, Realm flags =. |
ksetup |
ksetup domain |
Sets the domain name for all Kerberos operations. |
Syntax |
ksetup /domain <domainname> |
Parameters |
Parameter |
Description |
<domainname> |
Name of the domain to which you want to establish a connection. Use the fully-qualified domain name or a simple form of the name, such as contoso.com or contoso. |
<domainname> |
Examples |
To establish a connection to a valid domain, such as Microsoft, by using the ksetup /mapuser subcommand, type: |
ksetup /mapuser |
ksetup /mapuser principal@realm domain-user /domain domain-name |
After a successful connection, you'll receive a new TGT or an existing TGT will be refreshed. |
ksetup dumpstate |
Displays the current state of realm settings for all realms that are defined on the computer. This command displays the same output as the ksetup command. |
Syntax |
ksetup /dumpstate |
Remarks |
The output of this command includes the default realm (the domain that the computer is a member of) and all the realms that are defined on this computer. The following is included for each realm: |
All the Key Distribution Centers (KDCs) that are associated with this realm. |
All the set realm flags for this realm. |
The KDC password. |
This command doesn't display the domain name specified by DNS detection or by the command ksetup /domain. |
ksetup /domain |
This command doesn't display the computer password set by using the command ksetup /setcomputerpassword. |
ksetup /setcomputerpassword |
Examples |
To locate the Kerberos realm configurations on a computer, type: |
ksetup /dumpstate |
ksetup getenctypeattr |
Retrieves the encryption type attribute for the domain. A status message is displayed upon successful or failed completion. |
You can view the encryption type for the Kerberos ticket-granting ticket (TGT) and the session key, by running the klist command and viewing the output. You can set the domain to connect to and use, by running the ksetup /domain <domainname> command. |
ksetup /domain <domainname> |
Syntax |
ksetup /getenctypeattr <domainname> |
Parameters |
Parameter |
Description |
<domainname> |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.