To support Kerberos authentication with WSTEP enrollment, Certificate Enrollment Gateway requires a Kerberos keytab file. A keytab file contains pairs of Kerberos principals and encrypted keys derived from the Kerberos password. Certificate Enrollment Gateway will use the keytab file to authenticate to various remote systems using Kerberos without entering a password.

Log in to the Active Directory domain controller as a user with Domain Admin and Enterprise Admin permissions, and run the following command in PowerShell. 

ktpass /out <keytab_path> /mapuser <user> /princ <principal> /pass <password> /ptype KRB5_NT_PRINCIPAL /crypto <algorithm>

See below for a description of each parameter. 


For example:

ktpass /out "C:\Users\cegconfig\Documents\kerberos.keytab" /mapuser kerberos@example.com /princ HTTP/cegserver1.example.com@EXAMPLE.COM /pass EXAMPLE_password1234 /ptype KRB5_NT_PRINCIPAL /crypto All

<keytab_path>

The full path and file name of the keytab file that the command will generate. For example:

C:\Users\cegconfig\Documents\kerberos.keytab

You will transfer this keytab file to the server hosting Certificate Enrollment Gateway.

<user>

The Kerberos Service Account, using the following format:

<logon>@<domain>

Where:

  • <logon> is the Windows logon name of the Kerberos Service Account, in lowercase letters. For example, kerberos.
  • <domain> is the domain name of the Kerberos Service Account, in lowercase characters. For example, example.com.

For example:

kerberos@example.com

<principal>

The principal name of the Kerberos Service Account. The principal must be in the form:

HTTP/<ceg-fqdn>@<DOMAIN>

Where:

  • <ceg-fqdn> is the fully qualified domain name of the server hosting Certificate Enrollment Gateway. For example, cegserver1.example.com.
  • <DOMAIN> is the domain name of the Kerberos Service Account, in uppercase characters. For example, EXAMPLE.COM.

For example:

HTTP/cegserver1.example.com@EXAMPLE.COM

This parameter is case-sensitive.

<password>

The password of the Kerberos Service Account.

<algorithm>

The keys that are generated in the keytab file. Permitted values:

  • DES-CBC-CRC
  • DES-CBC-MD5
  • RC4-HMAC-NT
  • AES256-SHA1
  • AES128-SHA1
  • All

DES and RC4 algorithms are deprecated. You should specify an AES algorithm or All to allow all algorithms.