text stringlengths 0 4.23k |
|---|
/out <filename> |
Specifies the name of the Kerberos version 5 .keytab file to generate. Note: This is the .keytab file you transfer to a computer that isn't running the Windows operating system, and then replace or merge with your existing .keytab file, /Etc/Krb5.keytab. |
/princ <principalname> |
Specifies the principal name in the form host/computer.contoso.com@CONTOSO.COM. Warning: This parameter is case-sensitive. |
/mapuser <useraccount> |
Maps the name of the Kerberos principal, which is specified by the princ parameter, to the specified domain account. |
/mapop {add|set} |
Specifies how the mapping attribute is set.Add - Adds the value of the specified local user name. This is the default.Set - Sets the value for Data Encryption Standard (DES)-only encryption for the specified local user name. |
{-|+}desonly |
DES-only encryption is set by default.+ Sets an account for DES-only encryption.- Releases restriction on an account for DES-only encryption. Important: Windows doesn't support DES by default. |
/in <filename> |
Specifies the .keytab file to read from a host computer that is not running the Windows operating system. |
/pass {password|*|{-|+}rndpass} |
Specifies a password for the principal user name that is specified by the princ parameter. Use * to prompt for a password. |
/minpass |
Sets the minimum length of the random password to 15 characters. |
/maxpass |
Sets the maximum length of the random password to 256 characters. |
/crypto {DES-CBC-CRC|DES-CBC-MD5|RC4-HMAC-NT|AES256-SHA1|AES128-SHA1|All} |
Specifies the keys that are generated in the keytab file:DES-CBC-CRC - Used for compatibility.DES-CBC-MD5 - Adheres more closely to the MIT implementation and is used for compatibility.RC4-HMAC-NT - Employs 128-bit encryption.AES256-SHA1 - Employs AES256-CTS-HMAC-SHA1-96 encryption. AES128-SHA1 - Employs AES128-CTS-HMA... |
/itercount |
Specifies the iteration count that is used for AES encryption. The default ignores itercount for non-AES encryption and sets AES encryption to 4,096. |
/ptype {KRB5_NT_PRINCIPAL|KRB5_NT_SRV_INST|KRB5_NT_SRV_HST} |
Specifies the principal type.KRB5_NT_PRINCIPAL - The general principal type (recommended).KRB5_NT_SRV_INST - The user service instance KRB5_NT_SRV_HST - The host service instance |
/kvno <keyversionnum> |
Specifies the key version number. The default value is 1. |
/answer {-|+} |
Sets the background answer mode:- Answers reset password prompts automatically with NO.+ Answers reset password prompts automatically with YES. |
/target |
Sets which domain controller to use. The default is for the domain controller to be detected, based on the principal name. If the domain controller name doesn't resolve, a dialog box will prompt for a valid domain controller. |
/rawsalt |
forces ktpass to use the rawsalt algorithm when generating the key. This parameter is optional. |
{-|+}dumpsalt |
The output of this parameter shows the MIT salt algorithm that is being used to generate the key. |
{-|+}setupn |
Sets the user principal name (UPN) in addition to the service principal name (SPN). The default is to set both in the .keytab file. |
{-|+}setpass <password> |
Sets the user's password when supplied. If rndpass is used, a random password is generated instead. |
/? |
Displays Help for this command. |
<filename> |
<principalname> |
<useraccount> |
{add|set} |
{-|+} |
<filename> |
{password|*|{-|+}rndpass} |
* |
{DES-CBC-CRC|DES-CBC-MD5|RC4-HMAC-NT|AES256-SHA1|AES128-SHA1|All} |
Note: Because the default settings are based on older MIT versions, you should always use the /crypto parameter. |
/crypto |
{KRB5_NT_PRINCIPAL|KRB5_NT_SRV_INST|KRB5_NT_SRV_HST} |
<keyversionnum> |
{-|+} |
{-|+}dumpsalt |
{-|+}setupn |
{-|+}setpass <password> |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.