Updated: April 17, 2012
Applies To: Windows Server 2008 R2, Windows Server 2012, Windows 8
Adds additional realm flags to the specified realm. For examples of how this command can be used, see Examples.
The realm flags specify additional features of a Kerberos realm that is not based on the Windows Server operating system. Computers that are running Windows Server 2003, Windows Server 2008, or Windows Server 2008 R2 can use a Kerberos server to administer authentication instead of using a domain that is running a Windows Server operating system, and these systems participate in a Kerberos realm. This entry establishes the features of the realm. The following table describes each.
All realm flags are set.
No realm flags are set, and no additional features are enabled.
The IP address will be included within the ticket-granting tickets.
Both the Transmission Control Protocol (TCP) and the User Datagram Protocol (UDP) are supported in this realm.
Everyone in this realm is trusted for delegation.
This realm supports name canonicalization, which allows for DNS and Realm naming standards.
This realm supports RC4 encryption to enable cross-realm trust, which allows for the use of TLS.
Realm flags are stored in the Registry under HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa\Kerberos\Domains\Realm-name. This entry does not exist in the registry by default. You can use the Ksetup:addrealmflags command to populate the Registry.
You can see what realm flags are available and set by viewing the output of ksetup or ksetup /dumpstate.
List the available realm flags for the realm CONTOSO:
Set two flags to the CONTOSO realm:
ksetup /setrealmflags CONTOSO ncsupported delegate
Add one more flag that is not currently in the set:
ksetup /addrealmflags CONTOSO SendAddress
Run the ksetup command to verify that the realm flag is set by viewing the output and looking for Realm flags =.