Enable Kerberos Authentication for SMTP
Topic Last Modified: 2006-05-12
The Microsoft® Exchange Server Analyzer Tool queries the Active Directory® directory service to determine whether a Microsoft Exchange Server 2003 server that is installed on a Windows™ Server 2003 Cluster service has the Fully Qualified Domain Name (FQDN) of the server as a value for the SMTPSVC resource on the servicePrincipalName attribute.
If the Exchange Server Analyzer finds that the servicePrincipalName attribute for the SMTPSVC Exchange resource on the Cluster service does not contain the server's FQDN as a value, the Exchange Server Analyzer displays a best practice message.
It is a best practice to enable Kerberos authentication for Simple Mail Transfer Protocol (SMTP) Services on Windows Server 2003 cluster servers that are running Exchange Server 2003. You can enable Kerberos authentication by manually setting a new Service Principal Name (SPN) value for the SMTPSVC Exchange resource.
By default, Windows Server 2003 uses NTLM authentication. The Kerberos protocol is more flexible and efficient than NTLM, and more secure. The benefits gained by using Kerberos authentication are as follows:
Faster connections. With NTLM authentication, an application server must connect to a domain controller in order to authenticate each client. With Kerberos authentication, the server does not have to locate a domain controller. The server can authenticate the client by examining credentials presented by the client. Clients can obtain credentials for a particular server one time and reuse them throughout a network logon session.
Mutual authentication. NTLM enables servers to verify the identities of their clients. NTLM does not enable clients to verify a server's identity, or one server to verify the identity of another. NTLM authentication was designed for a network environment in which servers were assumed to be genuine. The Kerberos protocol makes no such assumption. Parties at both ends of a network connection can know that the party on the other end is who it claims to be.
Delegated authentication. Windows services impersonate clients when they access resources on the clients' behalf. Frequently, a service can complete its work for the client by accessing resources on the local computer. Both NTLM and Kerberos provide the information that a service must have in order to impersonate its client locally. However, some distributed applications are designed so that a front-end service must impersonate clients when it connects to back-end services on other computers. The Kerberos protocol has a proxy mechanism that enables a service to impersonate its client when it connects to other services. No equivalent is available with NTLM.
To resolve this issue, follow these steps to add the missing values for the affected attributes.Use the SETSPN.exe tool to add an SPN with the missing values
Install the Setspn.exe tool. To obtain the Setspn.exe tool, see "Windows 2000 Resource Kit Tool : Setspn.exe" (http://go.microsoft.com/fwlink/?LinkId=28103).
The Windows Server 2003 version of the Setspn.exe command-line tool is available in the Windows Server 2003 Support Tools that are included on the Windows Server 2003 CD. To install the Server 2003 Support Tools, double-click the Suptools.msi file in the Support/Tools folder.
Follow the guidance in the SETSPN.EXE Setspn_d.txt file to add the missing value to the Active Directory object for your Exchange server. The following example demonstrates adding the FQDN value for a virtual SMTP server SPN:
Start a command prompt, and then change to the directory where you installed Setspn.exe.
At the command prompt, type the following command:
setspn.exe-a SMTPSVC/mail.yourdomain.com YOURSERVERNAME
Note: Replace mail.yourdomain.com with your SMTP virtual server FQDN and YOURSERVERNAME with the name of the Exchange server.
Then press Enter.
- Start a command prompt, and then change to the directory where you installed Setspn.exe.