text stringlengths 0 4.23k |
|---|
Name of the domain to which you want to establish a connection. Use the fully-qualified domain name or a simple form of the name, such as corp.contoso.com or contoso. |
<domainname> |
Examples |
To verify the encryption type attribute for the domain, type: |
ksetup /getenctypeattr mit.contoso.com |
ksetup listrealmflags |
Lists the available realm flags that can be reported by ksetup. |
Syntax |
ksetup /listrealmflags |
Remarks |
Value |
Realm flag |
Description |
0xF |
All |
All realm flags are set. |
0x00 |
None |
No realm flags are set, and no additional features are enabled. |
0x01 |
sendaddress |
The IP address will be included within the ticket-granting tickets. |
0x02 |
tcpsupported |
Both the Transmission Control Protocol (TCP) and the User Datagram Protocol (UDP) are supported in this realm. |
0x04 |
delegate |
Everyone in this realm is trusted for delegation. |
0x08 |
ncsupported |
This realm supports name canonicalization, which allows for DNS and Realm naming standards. |
0x80 |
rc4 |
This realm supports RC4 encryption to enable cross-realm trust, which allows for the use of TLS. |
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa\Kerberos\Domains\<realmname> |
Examples |
To list the known realm flags on this computer, type: |
ksetup /listrealmflags |
To set the available realm flags that ksetup doesn't know, type: |
ksetup /setrealmflags CORP.CONTOSO.COM sendaddress tcpsupported delete ncsupported |
-OR- |
ksetup /setrealmflags CORP.CONTOSO.COM 0xF |
ksetup mapuser |
Maps the name of a Kerberos principal to an account. |
Syntax |
ksetup /mapuser <principal> <account> |
Parameters |
Parameter |
Description |
<principal> |
Specifies the fully-qualified domain name of any principal user. For example, mike@corp.CONTOSO.COM. If you don't specify an account parameter, mapping is deleted for the specified principal. |
<account> |
Specifies any account or security group name that exists on this computer, such as Guest, Domain Users, or Administrator. If this parameter is omitted, mapping is deleted for the specified principal. |
<principal> |
<account> |
Remarks |
An account can be specifically identified, such as Domain Guests, or you can use a wildcard character (*) to include all accounts. |
The computer only authenticates the principals of the given realm if they present valid Kerberos tickets. |
Whenever changes are made to the external Key Distribution Center (KDC) and the realm configuration, a restart of the computer where the setting was changed is required. |
Examples |
To see the current mapped settings and the default realm, type: |
ksetup |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.