text
stringlengths
0
4.23k
Name of the domain to which you want to establish a connection. Use the fully-qualified domain name or a simple form of the name, such as corp.contoso.com or contoso.
<domainname>
Examples
To verify the encryption type attribute for the domain, type:
ksetup /getenctypeattr mit.contoso.com
ksetup listrealmflags
Lists the available realm flags that can be reported by ksetup.
Syntax
ksetup /listrealmflags
Remarks
Value
Realm flag
Description
0xF
All
All realm flags are set.
0x00
None
No realm flags are set, and no additional features are enabled.
0x01
sendaddress
The IP address will be included within the ticket-granting tickets.
0x02
tcpsupported
Both the Transmission Control Protocol (TCP) and the User Datagram Protocol (UDP) are supported in this realm.
0x04
delegate
Everyone in this realm is trusted for delegation.
0x08
ncsupported
This realm supports name canonicalization, which allows for DNS and Realm naming standards.
0x80
rc4
This realm supports RC4 encryption to enable cross-realm trust, which allows for the use of TLS.
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa\Kerberos\Domains\<realmname>
Examples
To list the known realm flags on this computer, type:
ksetup /listrealmflags
To set the available realm flags that ksetup doesn't know, type:
ksetup /setrealmflags CORP.CONTOSO.COM sendaddress tcpsupported delete ncsupported
-OR-
ksetup /setrealmflags CORP.CONTOSO.COM 0xF
ksetup mapuser
Maps the name of a Kerberos principal to an account.
Syntax
ksetup /mapuser <principal> <account>
Parameters
Parameter
Description
<principal>
Specifies the fully-qualified domain name of any principal user. For example, mike@corp.CONTOSO.COM. If you don't specify an account parameter, mapping is deleted for the specified principal.
<account>
Specifies any account or security group name that exists on this computer, such as Guest, Domain Users, or Administrator. If this parameter is omitted, mapping is deleted for the specified principal.
<principal>
<account>
Remarks
An account can be specifically identified, such as Domain Guests, or you can use a wildcard character (*) to include all accounts.
The computer only authenticates the principals of the given realm if they present valid Kerberos tickets.
Whenever changes are made to the external Key Distribution Center (KDC) and the realm configuration, a restart of the computer where the setting was changed is required.
Examples
To see the current mapped settings and the default realm, type:
ksetup