Check Kerberos supported encryption types in Auth Debug script#297
Conversation
@microsoft-github-policy-service agree company="Microsoft" |
MaximeKjaer
left a comment
There was a problem hiding this comment.
Approving what we have so far. If you add auth method check I will re-approve
| Write-TestingPassed | ||
| } | ||
| else { | ||
| $disabledConfiguration = (-not $serverEncryption.SupportsKerberos) ? "Kerberos Authentication" : "AES-256 encryption" |
There was a problem hiding this comment.
Should we print both if both are required? Haven't tested the code below, but something like this:
$disabledConfiguration = @()
if (-not $serverEncryption.SupportsKerberos) { $disabledConfiguration += "Kerberos authentication" }
if (-not $serverEncryption.SupportsAES256) { $disabledConfiguration += "AES-256 encryption" }
$message = "Entra Kerberos requires $($disabledConfiguration -join ", ") to be enabled on the storage account"There was a problem hiding this comment.
It seems that when Kerberos is disabled (at least through the portal) it also disables all the encryption types. So I kept the same message but added a reminder to enable AES-256 when enabling Kerberos in the case Kerberos is disabled
MaximeKjaer
left a comment
There was a problem hiding this comment.
Approved with minor suggestion
Check for supported encryption types stored in registry 'HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System\Kerberos\Parameters' as part of the Debug script.
For Entra Kerberos, ensure AES-256 is enabled.
For AD DS, ensure the server and the client have common encryption types.