Lara,
 
I haven't really spent any time trying to undo the kerberos entries created
by the custom admin template, so I don't have any useful input at this
point.  I'll see if I can take a look at this at some point in time. 

As for your problem with the Service Principal names, we do not encounter
this issue since we pre-populate the ServicePrincipalName attribute of all
member machines to include the following:

HOST/hostname
HOST/hostname.domainsuffix

We do this using a script that pre-creates the computer accounts and
populates the necessary attributes.  Administrators have to run this script
from a member machine before joining new machines to the domain.  If you are
interested, here is the link to the create computer script on our website:

http://calnetad.berkeley.edu/documentation/scripts

Hope this helps.

Arden


> -----Original Message-----
> From: [EMAIL PROTECTED] 
> [mailto:[EMAIL PROTECTED] On Behalf Of Lara Adianto
> Sent: Friday, April 16, 2004 5:47 AM
> To: [EMAIL PROTECTED]
> Subject: RE: [ActiveDir] Using Security Configuration 
> Template instead of Ksetup...
> 
> Arden,
> 
> Thank you VERY much for taking time to answer my question. 
> You have provided a very clear explanation...
> I've tried it and it works like magic :-)
> 
> I have even added registries for the Group Policy Refresh, as 
> explained in http://www.jsiinc.com/sube/tip2100/rh2184.htm so 
> that any changes made on the registries we added in the Group 
> Policy Object will be reflected on the machines in the 
> domain. I've tested it, and it looks okay.
> 
> However, I notice that the group policy refresh doesn't apply 
> when you undefined the value of the registry (for example 
> changing KdcNames from kerberos.lara.com to Not defined) or 
> if you try to remove the registry (for example removing KdcNames).
> 
> I've tried rebooting the machine that serves as the DC, as 
> well as rebooting the client machine (which is the member of 
> the domain), but it didn't work.
> I've tried the following way as well:
> - rename the secedit.sdb file to "secedit.old"
> - run secedit /refreshpolicy machine_policy /enforce The new 
> secedit.sdb is created successfully, the the registries that 
> I've been trying to remove are still there (in Computer 
> Configuration mode windows settings\securitysettings\local 
> policies\security options). I wonder if you have the same 
> experience as me...
> 
> By the way, I have another problem that you might have 
> encountered as well...
> I have w2k client which authenticates to a Kerberos Realm. 
> This works perfectly. I have also configured a cross-realm 
> authentication between the Kerberos Realm and a w2k domain so 
> that (based on the following
> articles: Step by step Guide to Kerberos 5 Interoperability 
> and Windows 2000 compatibility section of Heimdal manual). 
> 
> So, when the w2k client (which is in a Kerberos Realm
> domain) wants to access another machine in another domain 
> (which is a w2k domain), it will sends a request for 
> cross-realm referral to the Kerberos Realm KDC, and the KDC 
> should be able to give a referral ticket.
> 
> The problem is that win2k machine sends request in short 
> names instead of in FQDN (host/foo.example.org will be sent 
> as host/foo, as explained in 'Implementation of Crossrealm 
> Referral Handling in the MIT Kerberos Client' by Michael 
> Swift, Irina Kosinovsky, and Johathan Trostle), hence the 
> burden to find the correct realm of the requested server 
> falls to the KDC. When I debug the code, I found out that for 
> host/foo, the KDC will try to find a match in [domain_realm] 
> section of krb5.conf or DNS lookup for foo. In this way I 
> have to provide a one-to-one mapping of foo to the correct 
> realm (foo = W2K.COm for example). Imagine if you have so 
> many machines in one domain, with so many service available 
> and you have to provide a one to one mapping of the hostname 
> / service name to its realm....It's not so practical, isn't it ?
> The better and correct way (to me) is to provide mapping of 
> domain name of the service/hostname to its realm....But I 
> don't know whether this is possible, and if yes...how to do it.
> 
> Do you encounter this problem ? If yes, how did you solve it 
> ? By the way, I'm using Heimdal.
> 
> Once again, thanks a lot !!
> -lara-
> 
> PS: By the way is there any guidelines on how to determine 
> the value of the GroupPolicyRefreshTime and 
> GroupPolicyRefreshTimeOffset ?
> 
> --- Arden Pineda <[EMAIL PROTECTED]> wrote:
> > Lara,
> > 
> > I am trying to refresh my memory since I had to perform the 
> same steps 
> > while rebuilding our test environment a while back.
> > Basically, we had to do it in
> > 2 steps in the order listed below.  
> > 
> > 1.  Create and import a custom ADM template that predefines the 
> > Kerberos REALM key in the registry.  This insures that the 
> REALM name 
> > is created in UPPERCASE.  If you try doing this in 
> SCEREGVL.INF file, 
> > the realm name is created, but in lowercase.  Proceed to 
> step 2 once 
> > the registry key has been propagated.
> > 
> > 2.  Edit the SCEREGVL.INF file and add the specific entries 
> for your 
> > KERBEROS realm.  Once you reload the file, the settings 
> will show up 
> > under the Computer Configuration node within Windows 
> Settings\Security 
> > Settings\Local Policies\Security Options.
> > 
> > I have added the sample ADM file and entries for the Security 
> > Configuration Editor file below.
> > 
> > Also, if you haven't already, you may also want to look at the NSA 
> > Windows 2000 Security Configuration guides at:
> > 
> >
> http://www.nsa.gov/snac/downloads_win2000.cfm?MenuID=scg10.3.1.1
> > 
> > I hope this helps.
> > 
> > Arden
> > 
> > ***************ADM
> > FILE***************************************
> > Class MACHINE
> > Category !!AdministrativeServices
> > Category !!Kerberos
> > Policy !!SetRealmFlags 
> > Keyname
> >
> "System\CurrentControlSet\Control\Lsa\Kerberos\Domains\YOURREALM.COM"
> > Explain !!SetRealmFlags_Help
> > Part !!RealmFlags Numeric Required
> >   Valuename "RealmFlags"
> >   Default 8
> > End Part
> > End Policy
> > End Category ;;Kerberos
> > 
> > End Category ;;AdministrativeServices
> > [strings]
> > AdministrativeServices="System"
> > Kerberos="Kerberos RealmFlags"
> > RealmFlags="RealmFlags value"
> > SetRealmFlags="Set YOURREALM.COM Kerberos RealmFlags
> > variable"
> > SetRealmFlags_Help="Creates the realm name variable
> > key for YOURREALM.COM
> > and allows referrals to work properly.\n\nThis key
> > is created to allow the
> > security policy defining the KDC mappings for the
> > realm to have the proper
> > realm name variable in the registry.\n\nThe value
> > set here (RealmFlags)
> > allows proper referrals from the  MIT-based Kerberos
> > realm. See
> >
> http://www.citi.umich.edu/u/kwc/krb5stuff/referral.html";
> > ;End of Strings
> > 
> > **************SCEREGVL.INF
> > file********************************
> > 
> > [Register Registry Values]
> > 
> > ; Kerberos
> > ;
> >
> ==============================================================
> ==============
> > ======
> > ;
> >
> http://www.microsoft.com/windows2000/techinfo/reskit/en/regent
> ry/95146.htm
> > ;
> >
> http://www.microsoft.com/windows2000/techinfo/reskit/en/regent
> ry/95141.htm
> > 
> >
> MACHINE\System\CurrentControlSet\Control\Lsa\Kerberos\Domains\
> YOURREALM.COM\
> > KpasswdNames,7,%Kpasswd%,4
> >
> MACHINE\System\CurrentControlSet\Control\Lsa\Kerberos\Domains\
> YOURREALM.COM\
> > KdcNames,7,%Knames%,4
> > ;
> >
> ==============================================================
> ==============
> > ======
> > 
> > [Strings]
> > 
> > ; =============================== YOURREALM
> > =========================================
> > Kpasswd = "Kerberos: YOURREALM.COM realm Change
> > Password Protocol Servers
> > (YOURREALM)"
> > Knames = "Kerberos: YOURREALM.COM realm KDC servers
> > (YOURREALM)"
> > 
> > 
> > 
> > > -----Original Message-----
> > > From: [EMAIL PROTECTED] 
> > > [mailto:[EMAIL PROTECTED] On
> > Behalf Of Lara Adianto
> > > Sent: Wednesday, April 14, 2004 1:53 AM
> > > To: [EMAIL PROTECTED]
> > > Subject: [ActiveDir] Using Security Configuration
> > Template 
> > > instead of Ksetup...
> > > 
> > > Hello,
> > > 
> > > In 'Step-by-step Guide to Kerberos 5
> > Interoperability'
> > > document, it is stated as follows:
> > > "To deploy realm configuration data to multiple
> > computers, 
> > > use the security configuration template mechanism
> > instead of 
> > > using Ksetup explicitly on individual computers"  
> > > 
> > > Is there any good document / howto about how to
> > use security 
> > > configuration template to achieve the same results
> > as ksetup ?
> > > 
> > > I've been reading some of microsoft knowledge
> > articles such 
> > > as: How to add custom registry settings to
> > security 
> > > configuration editor, how to create custom
> > administrative 
> > > templates in windows 2000, etc..but I haven't got
> > a clear 
> > > picture of how it can be done using security
> > configuration template.
> > > 
> > > This is the part that I don't understand:
> > > "Once the Sceregvl.inf file has been modified and
> > registered, 
> > > your custom registry values are exposed in the SCM
> > UI's on 
> > > that machine. You can then create security
> > templates or 
> > > policies that define your new registry values.
> > These 
> > > templates or policies can then be applied to any
> > machine 
> > > regardless of whether Sceregvl.inf has been
> > modified on the 
> > > target machine or not." (taken from Microsoft's
> > article: How 
> > > to add custom registry settings to security
> > configuration 
> > > editor). Is SCM the same as security configuration
> > tool and analysis ?
> > >  
> > > Well...from reading the article, my guess is that
> > I will need 
> > > to update sceregvl.inf, register the changes by
> > doing 
> > > 'regsvr32 scecli.dll', and also change the group
> > policy.
> > > 
> > > Anyway, I've tried to update sceregvl.inf but it
> > didn't work 
> > > :-( The changes didn't seem to be reflected in the
> > registry 
> > > editor as what usually happen using ksetup.
> > > 
> > > -lara- 
> > > 
> > > =====
> > >
> >
> --------------------------------------------------------------
> > > ----------------------
> > > La vie, voyez-vous, ca n'est jamais si bon ni si
> > mauvais qu'on croit
> > >                                                   
> >            
> > >           - Guy de Maupassant -
> > >
> >
> --------------------------------------------------------------
> > > ----------------------
> > > 
> > > 
> > >   
> > >           
> > > __________________________________
> > > Do you Yahoo!?
> > > Yahoo! Tax Center - File online by April 15th
> > 
> === message truncated ===
> 
> 
> =====
> --------------------------------------------------------------
> ---------------------- 
> La vie, voyez-vous, ca n'est jamais si bon ni si mauvais qu'on croit
>                                                               
>           - Guy de Maupassant -
> --------------------------------------------------------------
> ----------------------
> 
> 
>       
>               
> __________________________________
> Do you Yahoo!?
> Yahoo! Tax Center - File online by April 15th
> http://taxes.yahoo.com/filing.html
> List info   : http://www.activedir.org/mail_list.htm
> List FAQ    : http://www.activedir.org/list_faq.htm
> List archive: 
> http://www.mail-archive.com/activedir%40mail.activedir.org/
> 

List info   : http://www.activedir.org/mail_list.htm
List FAQ    : http://www.activedir.org/list_faq.htm
List archive: http://www.mail-archive.com/activedir%40mail.activedir.org/

Reply via email to