Can someone please help me with the following question.
In an Active Directory domain Kerberos is used for authentication and the KDC basically distributes symmetric session keys. Also the installation of AD CS (Active Directory Certificate Services, for asymmetric encryption) is an ‘optional’ component meaning
AD/Kerberos will function fine without AD CS.
I have an AD Domain 2003 R2 (LAB) with AD CS installed (2003 R2 also) installed one Server. This Server has not been switched on for a while and I see the following KDC waring in the event log
The currently selected KDC certificate was once valid, but now is invalid and no suitable replacement was found. Smartcard logon may not function correctly if this problem is not remedied.
Have the system administrator check on the state of the domain's public key infrastructure. The chain status is in the error data.
Which leads me to the following MS article (all be it for 2008 I am pretty sure it is the same issue)
https://technet.microsoft.com/en-us/library/cc733985(v=ws.10).aspx
Looking at the Local Machine/Personal store on the Server I see a couple of certificates both issued by the 2003 R2 CA, one of which was from the template “Domain Controller”. Now I understand you do not have to configure the distribution of certificates
to DCs based on this template as it is automatic when you install AD CS.
My question is if the KDC is complaining about this Cert and wants a new one from the CA, how does KDC work when no CA exists (as CA is optional).
Also I am not sure where this Certificate (for Asymmetric encryption) fits in, as I understand the KCD encrypts the session keys using the hash of the user (UPN) password (for TGT) and the hash of the user and service (UPN and SPN) for Service Ticket.
Unless the certificate is used as the initial Authentication Service (AS) stage when I believe the client initially encrypts the current date and time and sends this to the AS, as an authenticator (or is that the other way around), but again I thought
this was encrypted using the password hash UPN password hash.
Can someone please explain (or point me to an article explain this) where this X509 Certificate fits in to the overall Kerberos authentication scheme.
Thanks All
Ernie