text
stringlengths
0
4.23k
Both the Transmission Control Protocol (TCP) and the User Datagram Protocol (UDP) are supported in this realm.
0x04
delegate
Everyone in this realm is trusted for delegation.
0x08
ncsupported
This realm supports name canonicalization, which allows for DNS and Realm naming standards.
0x80
rc4
This realm supports RC4 encryption to enable cross-realm trust, which allows for the use of TLS.
Realm flags are stored in the registry under HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa\Kerberos\Domains\<realmname>. This entry doesn't exist in the registry by default. You can use the ksetup addrealmflags command to populate the registry.
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa\Kerberos\Domains\<realmname>
You can see the available and set realm flags by viewing the output of ksetup or ksetup /dumpstate.
ksetup /dumpstate
Examples
To list the available, and to set realm flags for the realm CONTOSO, type:
ksetup
To set two flags that aren't currently set, type:
ksetup /setrealmflags CONTOSO ncsupported delegate
To verify the realm flag is set, type ksetup and then view the output, looking for the text, Realm flags =. If you don't see the text, it means that the flag hasn't been set.
ksetup
ksetup
Performs tasks related to setting up and maintaining Kerberos protocol and the Key Distribution Center (KDC) to support Kerberos realms. Specifically, this command is used to:
Change the computer settings for locating Kerberos realms. In non-Microsoft, Kerberos–based implementations, this information is usually kept in the Krb5.conf file. In Windows Server operating systems, it's kept in the registry. You can use this tool to modify these settings. These settings are used by workstations to ...
Initialize registry keys that the Kerberos Security Support Provider (SSP) uses to locate a KDC for the Kerberos realm, if the computer is isn't a member of a Windows domain. After configuration, the user of a client computer running the Windows operating system can log on to accounts in the Kerberos realm.
Search the registry for the domain name of the user's realm and then resolves the name to an IP address by querying a DNS server. The Kerberos protocol can use DNS to locate KDCs by using only the realm name, but it must be specially configured to do so.
Syntax
ksetup
[/setrealm <DNSdomainname>]
[/mapuser <principal> <account>]
[/addkdc <realmname> <KDCname>]
[/delkdc <realmname> <KDCname>]
[/addkpasswd <realmname> <KDCPasswordName>]
[/delkpasswd <realmname> <KDCPasswordName>]
[/server <servername>]
[/setcomputerpassword <password>]
[/removerealm <realmname>]
[/domain <domainname>]
[/changepassword <oldpassword> <newpassword>]
[/listrealmflags]
[/setrealmflags <realmname> [sendaddress] [tcpsupported] [delegate] [ncsupported] [rc4]]
[/addrealmflags <realmname> [sendaddress] [tcpsupported] [delegate] [ncsupported] [rc4]]
[/delrealmflags [sendaddress] [tcpsupported] [delegate] [ncsupported] [rc4]]
[/dumpstate]
[/addhosttorealmmap] <hostname> <realmname>]
[/delhosttorealmmap] <hostname> <realmname>]
[/setenctypeattr] <domainname> {DES-CBC-CRC | DES-CBC-MD5 | RC4-HMAC-MD5 | AES128-CTS-HMAC-SHA1-96 | AES256-CTS-HMAC-SHA1-96}
[/getenctypeattr] <domainname>
[/addenctypeattr] <domainname> {DES-CBC-CRC | DES-CBC-MD5 | RC4-HMAC-MD5 | AES128-CTS-HMAC-SHA1-96 | AES256-CTS-HMAC-SHA1-96}
[/delenctypeattr] <domainname>
Parameters
Parameter
Description
ksetup setrealm
Makes this computer a member of a Kerberos realm.
ksetup addkdc
Defines a KDC entry for the given realm.
ksetup delkdc
Deletes a KDC entry for the realm.
ksetup addkpasswd
Adds a kpasswd server address for a realm.
ksetup delkpasswd
Deletes a kpasswd server address for a realm.
ksetup server
Allows you to specify the name of a Windows computer on which to apply the changes.
ksetup setcomputerpassword
Sets the password for the computer's domain account (or host principal).
ksetup removerealm
Deletes all information for the specified realm from the registry.