Domain Controller Kerberos Authentication via CNAME


hopefully have done research , not missed obvious..  in situation have decommission couple of domain controllers, 1 of used bunch of linux hosts ldap , kerberos authentication.  trying come solution allow point cname or virtual ip.  ldap doesn't seem big of issue can reference domain name instead of specific domain controller, have read kerberos , cnames don't mix.

so..  possible use cname clients authenticate against active directory domain controller?  if not, have recommendation achieve similar result?

thanks,

david

usedtobemct,

i didn't know if aware of or not. try cover what's relevant in responses based on original post.

a vip, found, won't work either. it's due kerb security, , being former mct, assuming in engineering (server) side and not dev side, knew going it! :-)

kerberos/ldap auth tricky lots of limitations obvious reasons. also think using same ip you're best bet.

cheers!


ace fekay
mvp, mct, mcitp/ea, mcts windows 2008/r2 & exchange 2007, exchange 2010 ea, mcse & mcsa 2003/2000, mcsa messaging 2003
microsoft certified trainer
microsoft mvp - directory services
technical blogs & videos: http://www.delawarecountycomputerconsulting.com/

this post provided as-is no warranties or guarantees , confers no rights.

facebooktwitterlinkedin




Windows Server  >  Directory Services



Comments

Popular posts from this blog

Error: 0x80073701 when trying to add Print Services Role in Windows 2012 Standard

Disconnecting from a Windows Server 2012 R2 file sharing session on a Windows 7,8,10 machine

Windows 2016 RDS event 1306 Connection Broker Client failed to redirect the user... Error: NULL