User Tools

Site Tools


paloaltonetworks:configuration:kerberos

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revisionPrevious revision
Next revision
Previous revision
paloaltonetworks:configuration:kerberos [2020/05/19 06:09] – [Knowledgebase Articles] bstaffordpaloaltonetworks:configuration:kerberos [2025/03/31 19:42] (current) bstafford
Line 20: Line 20:
         http/redirect.example.local         http/redirect.example.local
 Updated object</code> Updated object</code>
 +Windows 2022 keytab file generation
 +<code>ktpass /princ DNS/ns1.example.com/@REALM /mapuser Infobloxsa /pass ######## /out b1ddi.keytab /ptype krb5_nt_principal /crypto ALL</code>
 +older example
 <code>ktpass -princ http/redirect.domain.local@DOMAIN.LOCAL -mapuser DOMAIN\kerberosuser -pass Password123 -crypto aes256-sha1 -ptype KRB5_NT_PRINCIPAL -out keytabfile.keytab</code> <code>ktpass -princ http/redirect.domain.local@DOMAIN.LOCAL -mapuser DOMAIN\kerberosuser -pass Password123 -crypto aes256-sha1 -ptype KRB5_NT_PRINCIPAL -out keytabfile.keytab</code>
-<code>>ktpass -princ http/redirect.example.local@EXAMPLE.LOCAL -mapuser EXAMPLE\kerberosuser1 -pass Password123 -crypto aes256-sha1 -ptype KRB5_NT_PRINCIPAL -out keytabfile_redirect.keytab+<code>ktpass -princ http/redirect.example.local@EXAMPLE.LOCAL -mapuser EXAMPLE\kerberosuser1 -pass Password123 -crypto aes256-sha1 -ptype KRB5_NT_PRINCIPAL -out keytabfile_redirect.keytab
 Targeting domain controller: server1.EXAMPLE.LOCAL Targeting domain controller: server1.EXAMPLE.LOCAL
 Successfully mapped http/redirect.example.local to kerberosuser1. Successfully mapped http/redirect.example.local to kerberosuser1.
paloaltonetworks/configuration/kerberos.1589868540.txt.gz · Last modified: (external edit)