Assign a Kerberos authentication account to a site in Lync Server 2013
Topic Last Modified: 2016-03-22
To successfully complete this procedure you should be logged on as a user who is a member of the RTCUniversalServerAdmins group.
After creating the Kerberos account, you must assign it to a site. This is a Lync Server 2013 site, not an Active Directory site. You can create multiple Kerberos authentication accounts per deployment, but you can assign only one account to a site. Use the following procedure to assign a previously created Kerberos authentication account to a site. For details about creating the Kerberos account, see Create a Kerberos authentication account in Lync Server 2013.
As a member of the RTCUniversalServerAdmins group, log on to a computer in the domain running Lync Server 2013 or on to a computer where the administrative tools are installed.
Start the Lync Server Management Shell: Click Start, click All Programs, click Microsoft Lync Server 2013, and then click Lync Server Management Shell.
From the command line, run the following two commands:
New-CsKerberosAccountAssignment -UserAccount "Domain\UserAccount" -Identity "site:SiteName"
New-CsKerberosAccountAssignment -UserAccount "contoso\kerbauth" -Identity "site:redmond"
Note: You must specify the UserAccount parameter by using the Domain\User format. The User@Domain.extension format is not supported for referring to the computer objects created for Kerberos authentication purposes.
OPTIONAL: You may have configured an override FQDN (fully qualified domain name) for your WebServices, as per Change the Web Services URL in Lync Server 2013. If that's the case, you'll need to add a SPN for this FQDN as well. For example, if the FWDN was webservices.contoso.local, you would run:
setspn -S http/webservices.contoso.local kerbauth
Important: After making any changes to Kerberos authentication, such as adding an account or removing an account, you must run Enable-CsTopology from the Lync Server Management Shell command prompt.