A question about AD CS and Kerberos 'Domain Controller' Template certificates


can please me following question.

in active directory domain kerberos used authentication , kdc distributes symmetric session keys. installation of ad cs (active directory certificate services, asymmetric encryption) ‘optional’ component meaning ad/kerberos function fine without ad cs.

i have ad domain 2003 r2 (lab) ad cs installed (2003 r2 also) installed 1 server. server has not been switched on while , see following kdc waring in event log

the selected kdc certificate once valid, invalid , no suitable replacement found.  smartcard logon may not function correctly if problem not remedied.  have system administrator check on state of domain's public key infrastructure.  chain status in error data.

which leads me following ms article (all 2008 pretty sure same issue)

https://technet.microsoft.com/en-us/library/cc733985(v=ws.10).aspx

looking @ local machine/personal store on server see couple of certificates both issued 2003 r2 ca, 1 of template “domain controller”. understand not have configure distribution of certificates dcs based on template automatic when install ad cs.

my question if kdc complaining cert , wants new 1 ca, how kdc work when no ca exists (as ca optional).

 also not sure certificate (for asymmetric encryption) fits in, understand kcd encrypts session keys using hash of user (upn) password (for tgt) , hash of user , service (upn , spn) service ticket. unless certificate used initial authentication service (as) stage when believe client encrypts current date , time , sends as,  as authenticator (or other way around), again thought encrypted using password hash upn password hash.

 can please explain (or point me article explain this) x509 certificate fits in overall kerberos authentication scheme.

thanks all

ernie 

this related optional configuration. normal kerberos authentication works fine without ca or ca issued certificate. if dc proper certificate, dc can used authenticate smart card logons. without cert - dc unable participate in kind of authentication. there newer template called kerberos authentication replaces domain controller , domain controller authentication templates providing same functionalities, enables clients optionally verify id of kdc. requires cng (vista) or newer client take advantage.

mark b. cooper, president , founder of pki solutions inc., former microsoft senior engineer , subject matter expert microsoft active directory certificate services (adcs). known “the pki guy” @ microsoft 10 years. connect mark @ http://www.pkisolutions.com



Windows Server  >  Security



Comments

Popular posts from this blog

some help on Event 540

WMI Repository 4GB limit - Win 2003 Ent Question

Event ID 1302 (error 1307) DFS replication service encountered an error while writing to the debug log file