After Configuring an Active Directory in the agent, click Next to display the Preparing Service Account for Kerberos dialog.

image-2024-2-15_16-22-0.png

If you have not yet executed the displayed command:

  1. Click the icon to copy the command.
  2. Log in to the server hosting the root Active Directory domain controller as either:

    • A domain administrator
    • A user who is a member of the built-in Account Operators domain group.
  3. Paste the command in the Windows PowerShell.
  4. Replace the value of the /pass option with the password entered when Creating a PKIaaS WSTEP Service Account.
  5. Run the command.

Specifically, this ktpass command maps a Kerberos Principal to:

  • The Service Principal Names (SPN).
  • The User Principal Name (UPN). 

These mappings are necessary for compatibility with AES128 and AES256 algorithms in Kerberos Authentication.

See below for the command syntax.

ktpass /mapuser <USER> /princ HTTP/<PKIAAS-WSTEP-URL>@<UPPERCASE-DOMAIN-NAME> /pass <PASS> /ptype KRB5_NT_PRINCIPAL /Target <UPPERCASE-DOMAIN-NAME> /crypto ALL

Parameter

Value

​<USER>

​The name of the user described in Creating a PKIaaS WSTEP Service Account.

<PKIAAS-WSTEP-URL>

The region-specific URL for Entrust PKIaaS WSTEP. 

<UPPERCASE-DOMAIN-NAME>

The domain selected when previously Configuring an Active Directory in the agent, in uppercase. 

<USER-PASSWORD>

​The password of the user described in Creating a PKIaaS WSTEP Service Account.