[cifs-protocol] 120012721001773 Clarify in MS-KILE 3.3.5.7.5 how the KDC makes the decision

Sreekanth Nadendla srenaden at microsoft.com
Tue Jan 28 19:48:26 UTC 2020


Hello Isaac, my review shows that NO_TGT attribute effectively clears ok-as-delegate flag even in the same forest. Also ENABLE_TGT  trust attribute is not required to be set within the forest. I will be assisting you with getting these details documented in MS-KILE spec.


Regards,
Sreekanth Nadendla
Microsoft Windows Open Specifications

-----Original Message-----
From: Isaac Boukris <iboukris at gmail.com>
Sent: Monday, January 27, 2020 10:34 AM
To: Interoperability Documentation Help <dochelp at microsoft.com>; Stefan Metzmacher <metze at samba.org>; cifs-protocol at lists.samba.org
Subject: [EXTERNAL] Clarification request about TGT forwarding within forest MS-KILE 3.3.5.7.5

Hello dochelp,

This is a followup question to:
https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Flists.samba.org%2Farchive%2Fcifs-protocol%2F2020-January%2F003368.html&data=02%7C01%7Csrenaden%40microsoft.com%7C2d7a0e6bcb504dab19c008d7a36713b2%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637157535415482971&sdata=kaAsv9KsaYrvmfzXOy%2B%2BeCH%2BhqTbP3%2Fee0Wahp%2FLaBY%3D&reserved=0

Per my testing using updated Windows 2019, the TRUST_ATTRIBUTE_CROSS_ORGANIZATION_ENABLE_TGT_DELEGATION trust attribute is not required when both domains are in the same forest, and even if not set Windows KDC still set ok-as-delegate flag.

Could you please clarify in MS-KILE 3.3.5.7.5 how the KDC makes the decision not to require ENABLE_TGT attribute when in the same forest, and whether the NO_TGT attribute applies in that case or not.

Thanks!



More information about the cifs-protocol mailing list