Establish Kerberos Key Trust
Create a Kerberos Server object in your on-premises directory
Prerequisites
- Devices must be running Windows 10 version 2004 or later (Windows 11 is also supported).
- Windows Server Domain Controller must run Windows Server 2016 or later.
- AES256_HMAC_SHA1 must be enabled when Network security: Configure encryption types allowed for Kerberos policy is configured on domain controllers.
-
You must have the credentials required to complete the steps in this scenario:
- An Active Directory user who is a member of the Domain Admins group for a domain and a member of the Enterprise Admins group for a forest. Referred to as $domainCred.
- A Microsoft Entra user with the Hybrid Identity Administrator role. Referred to as $cloudCred.
- You also need a Microsoft Entra User CLOUD ONLY account, rather than one with just local global admin rights
-
Users must have the following Microsoft Entra attributes populated through Microsoft Entra Connect:
- onPremisesSamAccountName (accountName in Microsoft Entra Connect)
- onPremisesDomainName (domainFQDN in Microsoft Entra Connect)
- onPremisesSecurityIdentifier (objectSID in Microsoft Entra Connect)
Steps to Enable Kerberos Key Trust
-
Install the AzureADHybridAuthenticationManagement Module
- Open a PowerShell prompt using Run as Administrator.
- Install the AzureADHybridAuthenticationManagement module:
- Create a Kerberos Server object by using the AzureADHybridAuthenticationManagement module to create a Microsoft Entra Kerberos Server object in your on-premises directory.
-
Select one of the following 4 options to prompt for credentials and execute command to create the new Microsoft Entra ID Kerberos Server object.
- Option One: All credentials (Cloud+Domain)
- Option Two: Cloud credentials only
-
- Option Three: All credentials using modern authentication
-
- Option Four: All cloud credentials using modern authentication
-
- Option One: All credentials (Cloud+Domain)
- Verify the Microsoft Entra Kerberos Server Object
- Run the following command to confirm that the object was created successfully:

- Plan to Rotate the Kerberos Keys
- Create a plan to periodically rotate the krbtgt keys for your Kerberos Server object. It is recommended to rotate keys every 90–180 days for security. Use the following command to rotate the key:
-
Upgrade TruU CA Adapter General User FAQs

