Specifies the length of the data key. Use AES128 to generate a 128-bit symmetric key, or AES256 to generate a 256-bit symmetric key. You must specify either the KeySpec or the NumberOfBytes parameter (but not both) in every GenerateDataKey request. Possible values: AES256. If a key already exists, the user is prompted to enter the old key first. Keys are not encrypted until you issue the password encryption aes command. The master key can be changed (although this should not be necessary unless the key has become compromised in some way) by issuing the key config-key. Command again with the new master-key. Bootgen has both a GUI and a command line option. The GUI option is available in the Vitis IDE as a wizard. The functionality in this GUI is limited to the most standard functions when creating a boot image. The Bootgen command line, however, is a full-featured set of commands that lets you create a complex boot image for your system. Openssl aes-256-cbc is shorter than openssl enc -aes-256-cbc and works too. The manual page for this is available by running man enc.Never use ecb for data that should not be tempered with, always use cbc.-salt is redundant since it's default. If you omit -out filename the output will be written to standard output which is useful if you just need to analyze data, but not write it to disk.
-->Applies to: Windows Server (Semi-Annual Channel), Windows Server 2019, Windows Server 2016, Windows Server 2012 R2, Windows Server 2012
Configures the server principal name for the host or service in Active Directory Domain Services (AD DS) and generates a .keytab file that contains the shared secret key of the service. The .keytab file is based on the Massachusetts Institute of Technology (MIT) implementation of the Kerberos authentication protocol. The ktpass command-line tool allows non-Windows services that support Kerberos authentication to use the interoperability features provided by the Kerberos Key Distribution Center (KDC) service.
![Generate Aes Key Command Line Generate Aes Key Command Line](/uploads/1/1/0/3/110344991/660806950.png)
Syntax
Openssl Command Line Generate Aes Key
Parameters
Parameter | Description |
---|---|
/out <filename> | Specifies the name of the Kerberos version 5 .keytab file to generate. Note: This is the .keytab file you transfer to a computer that isn't running the Windows operating system, and then replace or merge with your existing .keytab file, /Etc/Krb5.keytab. |
/princ <principalname> | Specifies the principal name in the form host/[email protected]. Warning: This parameter is case-sensitive. |
/mapuser <useraccount> | Maps the name of the Kerberos principal, which is specified by the princ parameter, to the specified domain account. |
/mapop {add|set} | Specifies how the mapping attribute is set.
|
{-|+} desonly | DES-only encryption is set by default.
|
/in <filename> | Specifies the .keytab file to read from a host computer that is not running the Windows operating system. |
/pass {password|*|{-|+}rndpass} | Specifies a password for the principal user name that is specified by the princ parameter. Use * to prompt for a password. |
/minpass | Sets the minimum length of the random password to 15 characters. |
/maxpass | Sets the maximum length of the random password to 256 characters. |
/crypto {DES-CBC-CRC|DES-CBC-MD5|RC4-HMAC-NT|AES256-SHA1|AES128-SHA1|All} | Specifies the keys that are generated in the keytab file:
Note: Because the default settings are based on older MIT versions, you should always use the /crypto parameter. |
/itercount | Specifies the iteration count that is used for AES encryption. The default ignores itercount for non-AES encryption and sets AES encryption to 4,096. |
/ptype {KRB5_NT_PRINCIPAL|KRB5_NT_SRV_INST|KRB5_NT_SRV_HST} | Specifies the principal type.
|
/kvno <keyversionnum> | Specifies the key version number. The default value is 1. |
/answer {-|+} | Sets the background answer mode:
|
/target | Sets which domain controller to use. The default is for the domain controller to be detected, based on the principal name. If the domain controller name doesn't resolve, a dialog box will prompt for a valid domain controller. |
/rawsalt | forces ktpass to use the rawsalt algorithm when generating the key. This parameter is optional. |
{-|+}dumpsalt | The output of this parameter shows the MIT salt algorithm that is being used to generate the key. |
{-|+}setupn | Sets the user principal name (UPN) in addition to the service principal name (SPN). The default is to set both in the .keytab file. |
{-|+}setpass <password> | Sets the user's password when supplied. If rndpass is used, a random password is generated instead. |
/? | Displays Help for this command. |
Generate Aes Key Command Line Commands
Remarks
- Services running on systems that aren't running the Windows operating system can be configured with service instance accounts in AD DS. This allows any Kerberos client to authenticate to services that are not running the Windows operating system by using Windows KDCs.
- The /princ parameter isn't evaluated by ktpass and is used as provided. There's no check to see if the parameter matches the exact case of the userPrincipalName attribute value when generating the Keytab file. Case-sensitive Kerberos distributions using this Keytab file might have problems if there's no exact case match, and could even fail during pre-authentication. To check and retrieve the correct userPrincipalName attribute value from a LDifDE export file. For example:
Examples
To create a Kerberos .keytab file for a host computer that isn't running the Windows operating system, you must map the principal to the account and set the host principal password.
- Use the active directory User and computers snap-in to create a user account for a service on a computer that is not running the Windows operating system. For example, create an account with the name User1.
- Use the ktpass command to set up an identity mapping for the user account by typing:NoteYou cannot map multiple service instances to the same user account.
- Merge the .keytab file with the /Etc/Krb5.keytab file on a host computer that isn't running the Windows operating system.