Speedo
2008-11-17 09:19:31 UTC
Hi All
I'm trying SSPI calls on a Windows Server 2008, using
InitializeSecurityContext() to generate the first token sent to a peer
with SPN like http/host.local.domain. When the package name is given
as "Kerberos", it creates a nice Kerberos token. When package name be
"Negotiate", it creates an NTLM token.
My question is, how can I let Negotiate choose Kerberos as the
underlying mechanism. It should be safer than NTLM, right?
On the other hand, if the peer is a normal user (say, Administrator).
Both Negotiate and Kerberos emit a token using Kerberos, the user2user
TGT-REQUEST token.
Thanks
Goo
I'm trying SSPI calls on a Windows Server 2008, using
InitializeSecurityContext() to generate the first token sent to a peer
with SPN like http/host.local.domain. When the package name is given
as "Kerberos", it creates a nice Kerberos token. When package name be
"Negotiate", it creates an NTLM token.
My question is, how can I let Negotiate choose Kerberos as the
underlying mechanism. It should be safer than NTLM, right?
On the other hand, if the peer is a normal user (say, Administrator).
Both Negotiate and Kerberos emit a token using Kerberos, the user2user
TGT-REQUEST token.
Thanks
Goo