User Tools

Site Tools


paloaltonetworks:configuration:kerberos

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revisionPrevious revision
paloaltonetworks:configuration:kerberos [2022/11/23 12:49] – external edit 127.0.0.1paloaltonetworks:configuration:kerberos [2025/03/31 19:42] (current) bstafford
Line 20: Line 20:
         http/redirect.example.local         http/redirect.example.local
 Updated object</code> Updated object</code>
 +Windows 2022 keytab file generation
 +<code>ktpass /princ DNS/ns1.example.com/@REALM /mapuser Infobloxsa /pass ######## /out b1ddi.keytab /ptype krb5_nt_principal /crypto ALL</code>
 +older example
 <code>ktpass -princ http/redirect.domain.local@DOMAIN.LOCAL -mapuser DOMAIN\kerberosuser -pass Password123 -crypto aes256-sha1 -ptype KRB5_NT_PRINCIPAL -out keytabfile.keytab</code> <code>ktpass -princ http/redirect.domain.local@DOMAIN.LOCAL -mapuser DOMAIN\kerberosuser -pass Password123 -crypto aes256-sha1 -ptype KRB5_NT_PRINCIPAL -out keytabfile.keytab</code>
-<code>>ktpass -princ http/redirect.example.local@EXAMPLE.LOCAL -mapuser EXAMPLE\kerberosuser1 -pass Password123 -crypto aes256-sha1 -ptype KRB5_NT_PRINCIPAL -out keytabfile_redirect.keytab+<code>ktpass -princ http/redirect.example.local@EXAMPLE.LOCAL -mapuser EXAMPLE\kerberosuser1 -pass Password123 -crypto aes256-sha1 -ptype KRB5_NT_PRINCIPAL -out keytabfile_redirect.keytab
 Targeting domain controller: server1.EXAMPLE.LOCAL Targeting domain controller: server1.EXAMPLE.LOCAL
 Successfully mapped http/redirect.example.local to kerberosuser1. Successfully mapped http/redirect.example.local to kerberosuser1.
paloaltonetworks/configuration/kerberos.1669207782.txt.gz · Last modified: by 127.0.0.1