MIT Kerberos Client and MSLSA Cache

2015-04-17 Thread Meike Stone
Hello dear list, I have Windows 7 workstations, not joined to a AD Domain. I like to use MIT Kerberos client to authenticate to a Kerberos server and run several programs using Kerberos to authenticate. The MIT client is installed and running, I get a krbtgt and if I use Firefox with network.auth.

Is there a "CApath" concept in AD/DC?

2015-04-17 Thread Rick van Rein
Hello, MIT krb5 features a "CApath" setting through which an external party can help to find a path to realms that are not locally configured / crossed-over. Does Windows AD/DC have a similar feature, and how is it setup? For MIT krb5 I believe it's not possible to relay anything unknown through

Re: Is there a "CApath" concept in AD/DC?

2015-04-17 Thread Simo Sorce
On Fri, 2015-04-17 at 15:52 +0200, Rick van Rein wrote: > Hello, > > MIT krb5 features a "CApath" setting through which an external party can > help to find a path to realms that are not locally configured / > crossed-over. Does Windows AD/DC have a similar feature, and how is it > setup? > > Fo

Re: Is there a "CApath" concept in AD/DC?

2015-04-17 Thread Todd Grayson
We have seen, however, in limited testing and in field implementations, that CApath can express to a MIT kerberos client the inherent domain trusts on the AD side within a Forest. We're planning on doing more testing with it, but the discussion here applied to what we observed. https://access.red

Re: MIT Kerberos Client and MSLSA Cache

2015-04-17 Thread Benjamin Kaduk
On Fri, 17 Apr 2015, Meike Stone wrote: > Hello dear list, > > I have Windows 7 workstations, not joined to a AD Domain. > I like to use MIT Kerberos client to authenticate to a Kerberos server > and run several programs using Kerberos to authenticate. > The MIT client is installed and running, I