text stringlengths 0 4.23k |
|---|
Both the Transmission Control Protocol (TCP) and the User Datagram Protocol (UDP) are supported in this realm. |
0x04 |
delegate |
Everyone in this realm is trusted for delegation. |
0x08 |
ncsupported |
This realm supports name canonicalization, which allows for DNS and Realm naming standards. |
0x80 |
rc4 |
This realm supports RC4 encryption to enable cross-realm trust, which allows for the use of TLS. |
Realm flags are stored in the registry under HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa\Kerberos\Domains\<realmname>. This entry doesn't exist in the registry by default. You can use the ksetup addrealmflags command to populate the registry. |
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa\Kerberos\Domains\<realmname> |
You can see the available and set realm flags by viewing the output of ksetup or ksetup /dumpstate. |
ksetup /dumpstate |
Examples |
To list the available, and to set realm flags for the realm CONTOSO, type: |
ksetup |
To set two flags that aren't currently set, type: |
ksetup /setrealmflags CONTOSO ncsupported delegate |
To verify the realm flag is set, type ksetup and then view the output, looking for the text, Realm flags =. If you don't see the text, it means that the flag hasn't been set. |
ksetup |
ksetup |
Performs tasks related to setting up and maintaining Kerberos protocol and the Key Distribution Center (KDC) to support Kerberos realms. Specifically, this command is used to: |
Change the computer settings for locating Kerberos realms. In non-Microsoft, Kerberos–based implementations, this information is usually kept in the Krb5.conf file. In Windows Server operating systems, it's kept in the registry. You can use this tool to modify these settings. These settings are used by workstations to ... |
Initialize registry keys that the Kerberos Security Support Provider (SSP) uses to locate a KDC for the Kerberos realm, if the computer is isn't a member of a Windows domain. After configuration, the user of a client computer running the Windows operating system can log on to accounts in the Kerberos realm. |
Search the registry for the domain name of the user's realm and then resolves the name to an IP address by querying a DNS server. The Kerberos protocol can use DNS to locate KDCs by using only the realm name, but it must be specially configured to do so. |
Syntax |
ksetup |
[/setrealm <DNSdomainname>] |
[/mapuser <principal> <account>] |
[/addkdc <realmname> <KDCname>] |
[/delkdc <realmname> <KDCname>] |
[/addkpasswd <realmname> <KDCPasswordName>] |
[/delkpasswd <realmname> <KDCPasswordName>] |
[/server <servername>] |
[/setcomputerpassword <password>] |
[/removerealm <realmname>] |
[/domain <domainname>] |
[/changepassword <oldpassword> <newpassword>] |
[/listrealmflags] |
[/setrealmflags <realmname> [sendaddress] [tcpsupported] [delegate] [ncsupported] [rc4]] |
[/addrealmflags <realmname> [sendaddress] [tcpsupported] [delegate] [ncsupported] [rc4]] |
[/delrealmflags [sendaddress] [tcpsupported] [delegate] [ncsupported] [rc4]] |
[/dumpstate] |
[/addhosttorealmmap] <hostname> <realmname>] |
[/delhosttorealmmap] <hostname> <realmname>] |
[/setenctypeattr] <domainname> {DES-CBC-CRC | DES-CBC-MD5 | RC4-HMAC-MD5 | AES128-CTS-HMAC-SHA1-96 | AES256-CTS-HMAC-SHA1-96} |
[/getenctypeattr] <domainname> |
[/addenctypeattr] <domainname> {DES-CBC-CRC | DES-CBC-MD5 | RC4-HMAC-MD5 | AES128-CTS-HMAC-SHA1-96 | AES256-CTS-HMAC-SHA1-96} |
[/delenctypeattr] <domainname> |
Parameters |
Parameter |
Description |
ksetup setrealm |
Makes this computer a member of a Kerberos realm. |
ksetup addkdc |
Defines a KDC entry for the given realm. |
ksetup delkdc |
Deletes a KDC entry for the realm. |
ksetup addkpasswd |
Adds a kpasswd server address for a realm. |
ksetup delkpasswd |
Deletes a kpasswd server address for a realm. |
ksetup server |
Allows you to specify the name of a Windows computer on which to apply the changes. |
ksetup setcomputerpassword |
Sets the password for the computer's domain account (or host principal). |
ksetup removerealm |
Deletes all information for the specified realm from the registry. |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.