SUMMARY
The article How to configure Kerberos Authentication for MicroStrategy Library 10.x using Tomcat on Windows and Linux shows a step by a step guide on how to configure Strategy Library and Integrated Authentication (Kerberos) however, when following it, the user can face challenges if using AES 256 encryption. Below are the steps that need to be followed in order to get it working:
Explanation of 3.1:
+DumpSalt - The output of this parameter shows the MIT salt algorithm that is being used to generate the key
/ptype {KRB5_NT_PRINCIPAL} - Specifies the principal type, general principal type in this case.
/crypto - Specifies the keys that are generated in the keytab file, AES256-SHA1 employs AES256-CTS-HMAC-SHA1-96 encryption in this case.
EXAMPLE
ktpass /out C:\kerberos\dstanlibk.keytab +DumpSalt -princ dstanlibk@XXXXX.XXXXX.XXXX -pass 123*Strategy /ptype KRB5_NT_PRINCIPAL /crypto AES256-SHA1 /kvno 2
Output:
Building salt with principalname dstanlibk and domain XXXXX.XXXXX.XXXX
(encryption type 18)...
Hashing password with salt "XXXXX.XXXXX.XXXX".
Key created.
Output keytab to C:\kerberos\dstanlibk.keytab:
Keytab version: 0x502
keysize 86 dstanlibk@XXXXX.XXXXX.XXXX ptype 1 (KRB5_NT_PRINCIPAL) vno
2 etype 0x12 (AES256-SHA1) keylength 32 (0x733401de85faccfdadc40688cfa021098a4bd
5a7827a283cd646952fb198d371)
Notes:
After finishing the steps outlined below you can continue with the configuration as stated in How to configure Kerberos Authentication for MicroStrategy Library 10.x using Tomcat on Windows and Linux.
KB440786