After Configuring an Active Directory in the agent, click Next to display the Preparing Service Account for Kerberos dialog.
If you have not yet executed the displayed command:
- Click the icon to copy the command.
Log in to the server hosting the root Active Directory domain controller as either:
- A domain administrator
- A user who is a member of the built-in Account Operators domain group.
- Paste the command in the Windows PowerShell.
- Replace the value of the
/pass
option with the password entered when Creating a PKIaaS WSTEP Service Account. - Run the command.
Specifically, this ktpass
command maps a Kerberos Principal to:
- The Service Principal Names (SPN).
- The User Principal Name (UPN).
These mappings are necessary for compatibility with AES128 and AES256 algorithms in Kerberos Authentication.
See below for the command syntax.
ktpass /mapuser <USER> /princ HTTP/<PKIAAS-WSTEP-URL>@<UPPERCASE-DOMAIN-NAME> /pass <PASS> /ptype KRB5_NT_PRINCIPAL /Target <UPPERCASE-DOMAIN-NAME> /crypto ALL
Parameter | Value |
---|---|
<USER> | The name of the user described in Creating a PKIaaS WSTEP Service Account. |
<PKIAAS-WSTEP-URL> | The region-specific URL for Entrust PKIaaS WSTEP. |
<UPPERCASE-DOMAIN-NAME> | The domain selected when previously Configuring an Active Directory in the agent, in uppercase. |
<USER-PASSWORD> | The password of the user described in Creating a PKIaaS WSTEP Service Account. |