Users Guide

Table Of Contents
Configuring iDRAC6 for Single Sign-On and Smart Card Login 167
information between the server and the KDC. The ktpass tool allows
UNIX–based services that support Kerberos authentication to use the
interoperability features provided by a Windows Server Kerberos KDC
service.
The keytab obtained from the ktpass utility is made available to iDRAC6
as a file upload and is enabled to be a kerberized service on the network.
Since iDRAC6 is a device with a non-Windows operating system, run the
ktpass
utility—part of Microsoft Windows—on the Domain Controller
(Active Directory server) where you want to map iDRAC6 to a user
account in Active Directory.
For example, use the following
ktpass
command to create the Kerberos
keytab file:
C:\> ktpass.exe -princ
HTTP/idracname.domainname.com@DOMAINNAME.COM -
mapuser DOMAINNAME\username -mapOp set -crypto
DES-CBC-MD5 -ptype KRB5_NT_PRINCIPAL -pass
<password> +DesOnly -out c:\krbkeytab
NOTE: If you find any issues with iDRAC6 user the keytab file is created for,
create a new user and a new keytab file. If the same keytab file which was
initially created is again executed, it will not configure correctly.
After the above command executes successfully, run the following
command:
C:\>setspn -a HTTP/idracname.domainname.com
username
The encryption type that iDRAC6 uses for Kerberos authentication is
DES-CBC-MD5. The principal type is KRB5_NT_PRINCIPAL. The
properties of the user account that the Service Principal Name is mapped
to should have Use DES encryption types for this account property
enabled.
NOTE: You must create an Active Directory user account for use with the
-mapuser option of the ktpass command. Also, you should have the same
name as iDRAC6 DNS name to which you will upload the generated keytab
file.