Differences

This shows you the differences between the selected revisions of the page.

2008-06-04 2008-06-05
no summary (128.250.18.20) typography (martin)
Line 50: Line 50:
To use MIT Kerberos authentication, you need to have [[&url(kerberosforwin)|MIT Kerberos for Windows]] installed. To use MIT Kerberos authentication, you need to have [[&url(kerberosforwin)|MIT Kerberos for Windows]] installed.
-If your Kerberos realm is not in the AD, MIT Kerberos authentication will not be used. For this you will need to specify a Service Principal Name as described below. Then, either store the password for ''<user>@<Kerberos Realm>'' under the advanced tab of the User accounts control panel or use +If your Kerberos realm is not in the AD, MIT Kerberos authentication will not be used. For this you will need to specify a //[[ui_login_authentication#service_principal_name_sspi|Service Principal Name]]// as described below. Then, either store the password for ''<user>@<realm>'' by going to //Windows Start Menu &gt; Settings > Control Panel &gt; User Accounts > Advanced &gt; Manage Passwords > Add// or use following command to start WinSCP: ((If the latter method is used, the credentials that get established at startup after providing the kerberos password are only available to children of the initial process)) 
- ''runas /netonly /user:&lt;user>@&lt;realm> &lt;path to WinSCP>''  +  runas /netonly /user:&lt;user&gt;@&lt;realm> &lt;path_to_winscp>
-to start WinSCP. If the latter method is used, the credentials that get established at startup after providing the kerberos password are only available to children of the initial process - ie. started using the ''Session -&gt; New Session...'' or ''Session -> Saved Sessions'' navigation.+
===== Allow agent forwarding ===== ===== Allow agent forwarding =====
Line 61: Line 60:
The situation where it option is useful is where you do not have Kerberos for Windows on a local machine and are using cross realm where the realm of the server is not in AD. The local machine can be part of a domain, or a stand alone machine. It is proving handy for use from home for example. The situation where it option is useful is where you do not have Kerberos for Windows on a local machine and are using cross realm where the realm of the server is not in AD. The local machine can be part of a domain, or a stand alone machine. It is proving handy for use from home for example.
-The Service Principal Name should be entered in the form:+The //Service Principal Name// should be entered in the form:
<code> <code>
-host/<hostname>@<Kerberos Realm Name>+host/<hostname>@<realm>
</code> </code>
Line 70: Line 69:
<code> <code>
-ksetup /AddKdc <realm> <KdcName>+ksetup /AddKdc <realm> <kdc_name>
</code> </code>

Last modified: by martin