The steps listed following exemplify how to configure a Windows domain controller to support SiteMinder Kerberos authentication.
Important! This step is irreversible.
Note: The Ktpass command tool utility is a Windows support tool. You can install it from MSDN download or an installation CD. Always verify the version of support tools. The default encryption type must always be RC4-HMAC. The encryption type can be confirmed by running ktpass /? at the command prompt.
When the Policy Server is on Windows:
ktpass -out c:\wasrvwin2k8sps.keytab -princ HTTP/win2k8sps.test.com@TEST.COM -ptype KRB5_NT_PRINCIPAL -mapuser wasrvwin2k8sps -pass <<password>> Targeting domain controller: winkdc.Test.com Using legacy password setting method Successfully mapped HTTP/win2k8sps.test.com to wasrvwin2k8sps. Key created. Output keytab to c:\wasrvwin2k8sps.keytab: Keytab version: 0x502 keysize 67 HTTP/win2k8sps.test.com@TEST.COM ptype 1 (KRB5_NT_PRINCIPAL) vno 2 etype 0x17 (RC4-HMAC) keylength 16 (0xfd77a26f1f5d61d1fafd67a2d88784c7)
The password is the same as the one used for creating the service account for the web server.
When the Policy Server is on UNIX:
ktpass -out d:\sol10sunone_host.keytab -princ host/sol10sunone.test.com@TEST.COM -pass <<password>> -mapuser sol10sunone -crypto DES-CBC-MD5 +DesOnly -ptype KRB5_NT_PRINCIPAL -kvno 3 Targeting domain controller: winkdc.test.com Successfully mapped host/sol10sunone.test.com to sol10sunone. Key created. Output keytab to d:\sol10sunone_host.keytab: Keytab version: 0x502 keysize 52 host/sol10sunone.test.com@TEST ptype 1 (KRB5_NT_PRINCIPAL) vno 3 etype 0x3 (DES-CBC-MD5) keylength 8 (0xb5a87ab5070e7f4a) Account sol10sunone has been set for DES-only encryption.
When the Policy Server is on Windows:
Ktpass -out c:\polsrvwinps.keytab -princ smps/winps.test.com@TEST.COM -ptype KRB5_NT_PRINCIPAL -mapuser polsrvwinps -pass <<password>> Targeting domain controller: winkdc.Test.com Using legacy password setting method Successfully mapped smps/winps.test.com to polsrvwinps. Key created. Output keytab to c:\polsrvwinps.keytab: Keytab version: 0x502 keysize 72 smps/winps.test.com@TEST.COM ptype 1 (KRB5_NT_PRINCIPAL) vno 2 etype 0x17 (RC4-HMAC) keylength 16 (0xfd77a26f1f5d61d1fafd67a2d88784c7)
The password is same as the one used for creating the service account for Policy Server.
When the Policy Server is on UNIX:
ktpass -out d:\sol10polsrv.keytab -princ host/sol10sunone.test.com@TEST.COM -pass <<password>> -mapuser sol10sunone -crypto DES-CBC-MD5 +DesOnly -ptype KRB5_NT_PRINCIPAL -kvno 3 Targeting domain controller: winkdc.test.com Successfully mapped host/sol10sunone.test.com to sol10sunone. Key created. Output keytab to d:\sol10polserv.keytab: Keytab version: 0x502 keysize 52 host/sol10sunone.test.com@TEST ptype 1 (KRB5_NT_PRINCIPAL) vno 3 etype 0x3 (DES-CBC-MD5) keylength 8 (0xb5a87ab5070e7f4a) Account sol10sunone has been set for DES-only encryption.
Or, select the third option, Trust this user for delegation to specified service. Select the Use Kerberos only option button, and add the corresponding service principal name.
The domain controller is ready for SiteMinder Kerberos authentication.
| Copyright © 2012 CA. All rights reserved. |
|