Enabling Unconstrained delegation on AD<->MIT Trust

classic Classic list List threaded Threaded
1 message Options
Reply | Threaded
Open this post in threaded view

Enabling Unconstrained delegation on AD<->MIT Trust


We are using for some times now an AD KDC/MIT KDC trust, for some
political reason we are migrating the users for the MIT KDC to the AD.

Tests made in the beginning of the years were going almost "flawlessly"
(well as much as it is possible when trying to configure microsoft
software for interoperability).

The MIT KDC is configured by a GPO, using the Delegate (0x4) flags, and
the correct dns mappings. Basic things still work as of today except
credential delegation.

I suppose it's related to this:


But while there is way to re-enable the previous way for cross-forest
trust, the netdom commands aren't compatible with kerberosV5 interop,
and ksetup doesn't list any new flags that could correspond.

I tried adding the ok_as_delegate and ok_to_auth_as_delegate flags to
the mit principals but to no avail....

Anyone know if it is possible the re-enable unconstrained delegation for
Krbv5 in windows ?

I'm looking to ways to configure "contrained delegation" on the MIT KDC
but it's a very old setup using the db2 database, i can't seem to find a
guide for migrating to the ldap storage ?

MS AD is running Windows server 2012


Kerberos mailing list           [hidden email]