Skip to content

Check Kerberos supported encryption types in Auth Debug script#297

Merged
MarcosJLR merged 6 commits intoAzure-Samples:masterfrom
MarcosJLR:mlerones/check-supported-encryption-types
Feb 4, 2026
Merged

Check Kerberos supported encryption types in Auth Debug script#297
MarcosJLR merged 6 commits intoAzure-Samples:masterfrom
MarcosJLR:mlerones/check-supported-encryption-types

Conversation

@MarcosJLR
Copy link
Copy Markdown
Collaborator

Check for supported encryption types stored in registry 'HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System\Kerberos\Parameters' as part of the Debug script.

For Entra Kerberos, ensure AES-256 is enabled.

For AD DS, ensure the server and the client have common encryption types.

@MarcosJLR MarcosJLR requested a review from MaximeKjaer February 2, 2026 23:14
@MarcosJLR MarcosJLR self-assigned this Feb 2, 2026
@MarcosJLR
Copy link
Copy Markdown
Collaborator Author

@MarcosJLR please read the following Contributor License Agreement(CLA). If you agree with the CLA, please reply with the following information.

@microsoft-github-policy-service agree [company="{your company}"]

Options:

  • (default - no company specified) I have sole ownership of intellectual property rights to my Submissions and I am not making Submissions in the course of work for my employer.
@microsoft-github-policy-service agree
  • (when company given) I am making Submissions in the course of work for my employer (or my employer has intellectual property rights in my Submissions by contract or applicable law). I have permission from my employer to make Submissions and enter into this Agreement on behalf of my employer. By signing below, the defined term “You” includes me and my employer.
@microsoft-github-policy-service agree company="Microsoft"

Contributor License Agreement

@microsoft-github-policy-service agree company="Microsoft"

Comment thread AzFilesHybrid/AzFilesHybrid/AzFilesHybrid.psm1 Outdated
Comment thread AzFilesHybrid/AzFilesHybrid/AzFilesHybrid.psm1 Outdated
Comment thread AzFilesHybrid/AzFilesHybrid/AzFilesHybrid.psm1 Outdated
Comment thread AzFilesHybrid/AzFilesHybrid/AzFilesHybrid.psm1 Outdated
Comment thread AzFilesHybrid/AzFilesHybrid/AzFilesHybrid.psm1
Copy link
Copy Markdown
Collaborator

@MaximeKjaer MaximeKjaer left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Approving what we have so far. If you add auth method check I will re-approve

Write-TestingPassed
}
else {
$disabledConfiguration = (-not $serverEncryption.SupportsKerberos) ? "Kerberos Authentication" : "AES-256 encryption"
Copy link
Copy Markdown
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Should we print both if both are required? Haven't tested the code below, but something like this:

$disabledConfiguration = @()
if (-not $serverEncryption.SupportsKerberos) { $disabledConfiguration += "Kerberos authentication" }
if (-not $serverEncryption.SupportsAES256) { $disabledConfiguration += "AES-256 encryption" }
$message = "Entra Kerberos requires $($disabledConfiguration -join ", ") to be enabled on the storage account"

Copy link
Copy Markdown
Collaborator Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

It seems that when Kerberos is disabled (at least through the portal) it also disables all the encryption types. So I kept the same message but added a reminder to enable AES-256 when enabling Kerberos in the case Kerberos is disabled

Copy link
Copy Markdown
Collaborator

@MaximeKjaer MaximeKjaer left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Approved with minor suggestion

@MarcosJLR MarcosJLR merged commit a0406fc into Azure-Samples:master Feb 4, 2026
2 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants