A question about AD CS and Kerberos 'Domain Controller' Template certificates
can please me following question.
in active directory domain kerberos used authentication , kdc distributes symmetric session keys. installation of ad cs (active directory certificate services, asymmetric encryption) ‘optional’ component meaning ad/kerberos function fine without ad cs.
i have ad domain 2003 r2 (lab) ad cs installed (2003 r2 also) installed 1 server. server has not been switched on while , see following kdc waring in event log
the selected kdc certificate once valid, invalid , no suitable replacement found. smartcard logon may not function correctly if problem not remedied. have system administrator check on state of domain's public key infrastructure. chain status in error data.
which leads me following ms article (all 2008 pretty sure same issue)
https://technet.microsoft.com/en-us/library/cc733985(v=ws.10).aspx
looking @ local machine/personal store on server see couple of certificates both issued 2003 r2 ca, 1 of template “domain controller”. understand not have configure distribution of certificates dcs based on template automatic when install ad cs.
my question if kdc complaining cert , wants new 1 ca, how kdc work when no ca exists (as ca optional).
also not sure certificate (for asymmetric encryption) fits in, understand kcd encrypts session keys using hash of user (upn) password (for tgt) , hash of user , service (upn , spn) service ticket. unless certificate used initial authentication service (as) stage when believe client encrypts current date , time , sends as, as authenticator (or other way around), again thought encrypted using password hash upn password hash.
can please explain (or point me article explain this) x509 certificate fits in overall kerberos authentication scheme.
thanks all
ernie
mark b. cooper, president , founder of pki solutions inc., former microsoft senior engineer , subject matter expert microsoft active directory certificate services (adcs). known “the pki guy” @ microsoft 10 years. connect mark @ http://www.pkisolutions.com
Windows Server > Security
Comments
Post a Comment