Hello dear list,
I have Windows 7 workstations, not joined to a AD Domain.
I like to use MIT Kerberos client to authenticate to a Kerberos server
and run several programs using Kerberos to authenticate.
The MIT client is installed and running, I get a krbtgt and if I use
Firefox with network.auth.
Hello,
MIT krb5 features a "CApath" setting through which an external party can
help to find a path to realms that are not locally configured /
crossed-over. Does Windows AD/DC have a similar feature, and how is it
setup?
For MIT krb5 I believe it's not possible to relay anything unknown
through
On Fri, 2015-04-17 at 15:52 +0200, Rick van Rein wrote:
> Hello,
>
> MIT krb5 features a "CApath" setting through which an external party can
> help to find a path to realms that are not locally configured /
> crossed-over. Does Windows AD/DC have a similar feature, and how is it
> setup?
>
> Fo
We have seen, however, in limited testing and in field implementations,
that CApath can express to a MIT kerberos client the inherent domain trusts
on the AD side within a Forest. We're planning on doing more testing with
it, but the discussion here applied to what we observed.
https://access.red
On Fri, 17 Apr 2015, Meike Stone wrote:
> Hello dear list,
>
> I have Windows 7 workstations, not joined to a AD Domain.
> I like to use MIT Kerberos client to authenticate to a Kerberos server
> and run several programs using Kerberos to authenticate.
> The MIT client is installed and running, I