Endpoint Security Strong Authentication uses the Kerberos network authentication protocol. To configure this service, run ktpass.exe
from C:\Windows\System32
on the Active Directory Server.
ktpass
is included by default.ktpass
is included in the Microsoft Windows Server 2003 Support Tools Package. If you do not have this installed, download the suptools.msi
file from here. Important - In the procedure below you create a user that is mapped to the ktpass service. After you create this user, do not make changes to it, for example, do not change the password. If you do change the user, the key version increases and you must update the Key version number in the Active Directory SSO Configuration window in the SmartEndpoint. |
To prepare the Active Directory Server for authentication:
ktpass.exe
Syntax: ktpass princ ServiceName/realm@REALM mapuser <userName>@REALM pass <userPass> out <name of outFile>
Example:
Where:
|
Sample output:
WARNING: pType and account type do not match. This might cause problems. Key created. Output keytab to outfile.log: Keytab version: 0x502 keysize 74 tst/nac1.com@NAC1.COM ptype 0 (KRB5_NT_UNKNOWN) vno 7 etype 0x17 (RC4-H |
|||
Important - We recommend that you do not use DES-based encryption for the Active Directory Domain Controller server, as it is not secure. If you choose to use DES encryption and your environment has Windows 7 clients, see sk64300. |
|||
Notes -
|