Note that there are some explanatory texts on larger screens.

plurals
  1. POCredSSP PowerShell Session fails when using Kerberos for machine authentication
    primarykey
    data
    text
    <p>We are attempting to use CredSSP authentication for <a href="http://msdn.microsoft.com/en-us/library/windows/desktop/ee309365.aspx" rel="nofollow">multi-hop PowerShell remoting</a>, and one of our clients is running into a snag that prevents them from creating PSSessions using CredSSP when specifying the FQDN of the target server. Both server and client are joined to the same domain, and there's nothing fancy going on with disjoint namespaces.</p> <p>In the course of debugging, we've opened up all of the related security options we can think of; in specific:</p> <ul> <li>We've enabled the GP settings to Allow Delegating Fresh Credentials (standard and 'With NTLM only') with the wildcard SPN wsman/*</li> <li>We've enabled the WSMan Trusted Hosts setting with *.domain.com</li> <li>We've (of course) enabled WSMan for CredSSP on the server and the client</li> <li>We've set the LocalAccountTokenFilterPolicy on the server</li> </ul> <p>With all those settings opened up, here's what we get when trying different authentication methods for PSSessions:</p> <ul> <li>Using Kerberos for delegation with explicit domain credentials works fine.</li> <li>Using Negotiate for delegation with explicit domain credentials works fine.</li> <li>Using CredSSP for delegation: <ul> <li>Using domain credentials, connecting to the FQDN of the server, fails with the error <a href="http://msdn.microsoft.com/en-us/library/ms838310.aspx" rel="nofollow">There are currently no logon servers available to service the logon request</a></li> <li>Using domain credentials, connecting to just the hostname of the server, fails with the same error</li> <li>Using credentials for a local account on the server (thus forcing NTLM for server identity verification, I believe), connecting to the FQDN of the server, works fine</li> <li>Using domain credentials, connecting to the IP address of the server (thus forcing NTLM for server identity verification), works fine</li> </ul></li> </ul> <p>So, in short, CredSSP works as long as we're using NTLM for server authentication and fails when we use Kerberos, but Kerberos definitely works fine if we're using Kerberos for delegation as well. How is that possible, and what can we do to make it so that CredSSP+Kerberos works?</p>
    singulars
    1. This table or related slice is empty.
    1. This table or related slice is empty.
    plurals
    1. This table or related slice is empty.
    1. This table or related slice is empty.
    1. This table or related slice is empty.
 

Querying!

 
Guidance

SQuiL has stopped working due to an internal error.

If you are curious you may find further information in the browser console, which is accessible through the devtools (F12).

Reload