[30145] in Kerberos

home help back first fref pref prev next nref lref last post

Creating an MIT style keytab for an existing Windows AD member

daemon@ATHENA.MIT.EDU (Edward Irvine)
Wed Jul 23 04:00:18 2008

Mime-Version: 1.0 (Apple Message framework v753.1)
Message-Id: <2EFEBB04-5276-442A-9EA3-B9B41FDEC9A7@tpg.com.au>
To: kerberos@mit.edu
From: Edward Irvine <eirvine@tpg.com.au>
Date: Wed, 23 Jul 2008 17:59:17 +1000
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Errors-To: kerberos-bounces@mit.edu

Hi,

I'd like to find out if there is any way to extract a HOST keytab for  
a windows computer that is already a member of an active directory  
domain.

A Java developer I look after wants to do the single sign on thing to  
his web application. Our environment is a mixed Active Directory and  
Solaris environment.

By creating a new user in active directory, and mapping the user to a  
service principle using ktpass.exe, we now have SPNEGO single sign on  
working between the clients Internet Explorer and the JBoss server on  
*Solaris*. So far so good.

The developer, who uses a Windows workstation that is part the Active  
Directory domain, now wants the SPNEGO authentication to work in his  
own windows workstation - and for that to work I need to get the  
keytab for the host/pingname.of.host@KERBEROS.REALM.NAME

A quick LDAP lookup of his workstation in AD reveals that it already  
has a servicePrincipalName of HOST/pingname.of.host - so presumably I  
can extract the keytab somehow. But how?

I don't personally have admin access to the AD domain, but I work  
with the folks who do.

Eddie

________________________________________________
Kerberos mailing list           Kerberos@mit.edu
https://mailman.mit.edu/mailman/listinfo/kerberos

home help back first fref pref prev next nref lref last post