text stringlengths 0 4.23k |
|---|
To map Mike Danseglio's account within the Kerberos realm CONTOSO to the guest account on this computer, granting him all the privileges of a member of the built-in Guest account without having to authenticate to this computer, type: |
ksetup /mapuser mike@corp.CONTOSO.COM guest |
To remove the mapping of Mike Danseglio's account to the guest account on this computer to prevent him from authenticating to this computer with his credentials from CONTOSO, type: |
ksetup /mapuser mike@corp.CONTOSO.COM |
To map Mike Danseglio's account within the CONTOSO Kerberos realm to any existing account on this computer, type: |
ksetup /mapuser mike@corp.CONTOSO.COM * |
Note |
If only the Standard User and Guest accounts are active on this computer, Mike's privileges are set to those. |
To map all accounts within the CONTOSO Kerberos realm to any existing account of the same name on this computer, type: |
ksetup /mapuser * * |
ksetup removerealm |
Deletes all information for the specified realm from the registry. |
The realm name is stored in the registry under HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa\Kerberos and HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Lsa\Kerberos. This entry doesn't exist in the registry by default. You can use the ksetup addrealmflags command to populate the registry. |
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa\Kerberos |
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Lsa\Kerberos |
Important |
You can't remove the default realm name from the domain controller because this resets its DNS information, and removing it might make the domain controller unusable. |
Syntax |
ksetup /removerealm <realmname> |
Parameters |
Parameter |
Description |
<realmname> |
Specifies the uppercase DNS name, such as CORP.CONTOSO.COM, and is listed as the default realm or Realm= when ksetup is run. |
<realmname> |
Examples |
To remove an erroneous realm name (.CON instead of .COM) from the local computer, type: |
ksetup /removerealm CORP.CONTOSO.CON |
To verify the removal, you can run the ksetup command and review the output. |
ksetup server |
Allows you to specify a name for a computer running the Windows operating system, so changes made by the ksetup command update the target computer. |
The target server name is stored in the registry under HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\LSA\Kerberos. This entry isn't reported when you run the ksetup command. |
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\LSA\Kerberos |
Important |
There's no way to remove the targeted server name. Instead, you can change it back to the local computer name, which is the default. |
Syntax |
ksetup /server <servername> |
Parameters |
Parameter |
Description |
<servername> |
Specifies the full computer name on which the configuration will be effective, such as IPops897.corp.contoso.com.If an incomplete fully-qualified domain computer name is specified, the command will fail. |
<servername> |
If an incomplete fully-qualified domain computer name is specified, the command will fail. |
Examples |
To make your ksetup configurations effective on the IPops897 computer, which is connected on the Contoso domain, type: |
ksetup /server IPops897.corp.contoso.com |
ksetup setcomputerpassword |
Sets the password for the local computer. This command affects the computer account only and requires a restart for the password change to take effect. |
Important |
The computer account password isn't displayed in the registry or as output from the ksetup command. |
Syntax |
ksetup /setcomputerpassword <password> |
Parameters |
Parameter |
Description |
<password> |
Specifies the supplied password to set the computer account on the local computer. The password can only be set by using an account with administrative privileges, and the password must be from 1 to 156 alphanumeric or special characters. |
<password> |
Examples |
To change the computer account password on the local computer from IPops897 to IPop$897!, type: |
ksetup /setcomputerpassword IPop$897! |
ksetup setenctypeattr |
Sets the encryption type attribute for the domain. A status message is displayed upon successful or failed completion. |
You can view the encryption type for the Kerberos ticket-granting ticket (TGT) and the session key, by running the klist command and viewing the output. You can set the domain to connect to and use, by running the ksetup /domain <domainname> command. |
ksetup /domain <domainname> |
Syntax |
ksetup /setenctypeattr <domainname> {DES-CBC-CRC | DES-CBC-MD5 | RC4-HMAC-MD5 | AES128-CTS-HMAC-SHA1-96 | AES256-CTS-HMAC-SHA1-96} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.