>>Consider using msktutil(1), it does a very good job with the Active
Directory.
After creating the keytab file by using the KTPASS command, keytab file is
added in BS2000 machine and connection test becomes successful for
encryption types RC4_HMAC_NT, AES128-SHA1, AES256-SHA1, DES_CBC_CRC and
DE
Thanks for the response.
>Consider using msktutil(1), it does a very good job with the Active
Directory.
I am using BS2000 machine as server, and on BS2000 it is not required to
merge the keytab files, on BS2000 only /ADD-KEYTAB-ENTRY and
/MODIFY-LOGON-PROTECTION need to performed.
Thank You
> Hi All ,
>
> This is my setup .
>
> windows 8.1 64 bit
> windows 2012 R2 server AD and KDC .
> BS2000 with MIT kerberos 1.13.2
>
> I generate keytab for SPN using this command :
>
> ktpass -princ host/@domain name -mapuser user pass> pass -crypto RC4-HMAC-NT -ptype KRB5_NT_PRINCIPAL -
> o
Hi All ,
This is my setup .
windows 8.1 64 bit
windows 2012 R2 server AD and KDC .
BS2000 with MIT kerberos 1.13.2
I generate keytab for SPN using this command :
ktpass -princ host/@domain name -mapuser pass -crypto RC4-HMAC-NT -ptype KRB5_NT_PRINCIPAL -out
C:\KeyTab\HMAC7U6.keytab
I am t