Previous Topic: Domain Controller Setup on Windows for NTLMNext Topic: KDC Configuration on a UNIX System


Domain Controller Setup on Windows for Kerberos

When using Kerberos, the domain controller is the key distribution center (KDC) for the Kerberos Realm. In a pure Windows 2003 environment, a Kerberos Realm is equivalent to a Windows Domain. The domain controller host provides storage for the user, service accounts, credentials, the Kerberos ticketing services, and Windows Domain services.

A keytab file is required for Kerberos authentication, which lets users logged on to the CA SiteMinder® Federation Standalone server authenticate with the KDC without being prompted for a password. The keytab file is created with the ktpass utility. The ktpass command tool utility is a Windows support tool. The default encryption type is RC4-HMAC-NT, which can be confirmed by running ktpass /? at the command prompt. Also, be sure to confirm the Kerberos version number.

To deploy the Windows domain controller when using Kerberos

  1. Promote Windows 2003 SP 1 Server to a domain controller using the Windows dcpromo utility.
  2. Open the Active Directory Users and Computers dialog from Administrative tools.
  3. Select Create a User Account.
  4. Enter a password for this account.
  5. Clear the User Must Change Password at Next Logon option.
  6. Associate the Windows 2003 workstation account with a server principal name (for example, HTTP/IWAConnectorHostName.idp.com@IDP.COM).
  7. Create a keytab file.

    Use the password entered in step 4.

  8. Copy the keytab file to a secure location on the CA SiteMinder® Federation Standalone server at the asserting party.

    Important! The keytab name with its full path must be specified in the Keytab Location field during the CA SiteMinder® Federation Standalone Windows Agent configuration.

The domain controller is deployed for Kerberos on systems running Windows.