1. You are viewing our forum as a guest. For full access please Register. WindowsBBS.com is completely free, paid for by advertisers and donations.

Mapping Kerberos jargon from UNIX to Windows 2003

Discussion in 'Legacy Windows' started by gw1500se, 2004/04/07.

Thread Status:
Not open for further replies.
  1. 2004/04/07
    gw1500se

    gw1500se Well-Known Member Thread Starter

    Joined:
    2003/01/10
    Messages:
    444
    Likes Received:
    0
    I'm trying to set up a Windows 2003 server as a slave KDC where the master is a UNIX machine (Actually MAC OS X). The main problem I am having is I cannot understand the terminology used in Windows in UNIX equivalents.

    For example, generating a keytab with ktpass is nothing like generating it on a UNIX system. The arguments used are foreign to me as a UNIX admin.

    Is there a document somewhere, or can someone do a little hand-holding to get me through this? We can take it off-line if desired. TIA.
     
  2. 2004/04/08
    GusD

    GusD Inactive

    Joined:
    2002/02/12
    Messages:
    33
    Likes Received:
    0

  3. to hide this advert.

  4. 2004/04/13
    gw1500se

    gw1500se Well-Known Member Thread Starter

    Joined:
    2003/01/10
    Messages:
    444
    Likes Received:
    0
    Thanks for the links but I've already seen them (at least the first, the 2nd seems to be broken). Anyway, the way it works under 2003 seems to be different then 2000 so that documentation does not apply. There is really only 1 primary command for 2003 (ksetup) and the parameters it asks for do not make sense to me in so far as what they mean in Unix terms (ktadmin).

    For example, how do I create a principal on 2003 for the master KDC? I cannot come up with the correct parameters for ksetup.
     
Thread Status:
Not open for further replies.

Share This Page

  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.