Extracting the Key of the Service Principal for eDirectory

Use the Kerberos Administration tool that is available with your KDC to extract the key of the eDirectory service principal created in the Creating a Service Principal for eDirectory and store it in the local file system. This can be done with the help of your Kerberos administrator.

For example, if you are using an MIT KDC, execute the following command:

kadmin: ktadd -k /directory_path/keytabfilename -e des-cbc-crc:normal novledir/MYTREE@MYREALM

For example, if you are using Microsoft KDC, create a user novledirMYTREE in Active Directory and then execute the following command:

ktpass -princ novledir/MYTREE@MYREALM -mapuser novledirMYTREE -pass mypassword -out MYTREE.keytab

This command maps the principal (novledir/MYTREE@MYREALM) to the user account (novledirMYTREE), sets the host principal password to mypassword, and extracts the key into the MYTREE.keytab file.

For example, if you are using Heimdal KDC, execute the following command:

kadmin> ext_keytab -k /directory_path/keytabfilename novledir/MYTREE@MYREALM

where keytabfilename is the name of the file that contains the extracted key, MYTREE is the treename, and MYREALM is the Kerberos realm.