Generate Keytab File Kerberos
Quick Links
Parameters
Parameter | Description | ||
---|---|---|---|
/out <FileName> | Specifies the name of the Kerberos version 5 .keytab file to generate.
| ||
/princ <PrincipalName> | Specifies the principal name in the form host/computer.contoso.com@CONTOSO.COM. Warning This parameter is case sensitive. See Remarks for more information. | ||
/mapuser <UserAccount> | Maps the name of the Kerberos principal, which is specified by the princ parameter, to the specified domain account. | ||
/mapop {add|set} | Specifies how the mapping attribute is set.
| ||
{-|+}desonly | DES-only encryption is set by default.
Important Beginning with Windows 7 and Windows Server 2008 R2, Windows does not support DES by default. | ||
/in <FileName> | Specifies the .keytab file to read from a host computer that is not running the Windows operating system. | ||
/pass {Password|*|{-|+}rndpass} | Specifies a password for the principal user name that is specified by the princ parameter. Use '*' to prompt for a password. | ||
/minpass | Sets the minimum length of the random password to 15 characters. | ||
/maxpass | Sets the maximum length of the random password to 256 characters. | ||
/crypto {DES-CBC-CRC|DES-CBC-MD5|RC4-HMAC-NT|AES256-SHA1|AES128-SHA1|All} | Specifies the keys that are generated in the keytab file:
Note The default settings are based on older MIT versions. Therefore, /crypto should always be specified. | ||
/itercount | Specifies the iteration count that is used for AES encryption. The default is that itercount is ignored for non-AES encryption and set at 4,096 for AES encryption. | ||
/ptype {KRB5_NT_PRINCIPAL|KRB5_NT_SRV_INST|KRB5_NT_SRV_HST} | Specifies the principal type.
| ||
/kvno <KeyVersionNum> | Specifies the key version number. The default value is 1. | ||
/answer {-|+} | Sets the background answer mode: - Answers reset password prompts automatically with NO. + Answers reset password prompts automatically with YES. | ||
/target | Sets which domain controller to use. The default is for the domain controller to be detected, based on the principal name. If the domain controller name does not resolve, a dialog box will prompt for a valid domain controller. | ||
/rawsalt | Forces Ktpass to use the rawsalt algorithm when generating the key. This parameter is not needed. | ||
{-|+}dumpsalt | The output of this parameter shows the MIT salt algorithm that is being used to generate the key. | ||
{-|+}setupn | Sets the user principal name (UPN) in addition to the service principal name (SPN). The default is to set both in the .keytab file. | ||
{-|+}setpass <Password> | Sets the user's password when supplied. If rndpass is used, a random password is generated instead. | ||
/?|/h|/help | Displays command-line Help for Ktpass. |
Remarks
Services running on systems that are not running the Windows operating system can be configured with service instance accounts in Active Directory Domain Services. This allows any Kerberos client to authenticate to services that are not running the Windows operating system by using Windows KDCs.
The /princ parameter is not evaluated by Ktpass and is used as provided. There is no check to see if the parameter matches the exact case of the userPrincipalName attribute value when generating the Keytab file. Case sensitive Kerberos distributions using this Keytab file might have problems when there is no exact case match and could fail during pre-authentication. Check and retrieve the correct userPrincipalName attribute value from a LDIFDE export file. For example:
Examples
The following example illustrates how to create a Kerberos .keytab file, machine.keytab, in the current directory for the user Sample1. (You will merge this file with the Krb5.keytab file on a host computer that is not running the Windows operating system.) The Kerberos .keytab file will be created for all supported encryption types for the general principal type.
Generate Keytab File Windows
To generate a .keytab file for a host computer that is not running the Windows operating system, use the following steps to map the principal to the account and set the host principal password:
Generate Keytab File Linux
Use the Active Directory User and Computers snap-in to create a user account for a service on a computer that is not running the Windows operating system. For example, create an account with the name Sample1.
Use Ktpass to set up an identity mapping for the user account by typing the following at a command prompt:
Note
You cannot map multiple service instances to the same user account.
Merge the .keytab file with the /Etc/Krb5.keytab file on a host computer that is not running the Windows operating system.