The create-keytab script, when executed will ask a number of questions to guide the creation of the keytab. At the end the keytab will be validated to ensure it was created successfully.
There are a number of features but of note is the ability to create a keytab against an existing service account and reset the password to something secret. It is also possible to keep the existing password.
The script is attached to this article as well as being available installed with version 4.1.0-22611 (it is expected to work with all 4.1 versions) and above in the following location: /opt/quest/libexec/vas/scripts/vas_sa_manager.sh
Below is an example of a successful execution of the script. It must be executed as root.
# /opt/quest/libexec/vas/scripts/vas_sa_manager.sh
Specify the keytab path: : /etc/opt/quest/vas/sas9.keytab
looking for keytab /etc/opt/quest/vas/sas9.keytab .......................................................... not found
Use an existing Active Directory user or service account? [yes]: yes
This step creates a service keytab for a pre-existing
service account in Active Directory.
You will need to know the account password for the
service account or have permissions to reset the accounts
password.
Contact your systems administration staff if you do not.
Please specify the samAccountName of the existing service:
samAccountName: test-sas9
Do you want to change/set the password for test-sas9 [no]: yes
Do you want to use test-sas9 to change their password [yes]: no
Credentials required to set test-sas9 password
Please login with a sufficiently privileged domain account.
Username [Administrator]: administrator
Password for administrator@EXAMPLE.COM:
Validating that AD object test-sas9 exists in AD ......................................................... AD object found
Using AD object ............................................................................................ CN=test-sas9,CN=Computers,DC=EXAMPLE,DC=COM
Do you want to change the password for test-sas9 to a random secure password? [no]: yes
Successfully changed password for test-sas9
output new password to screen? [no]: no
Creating keytab /etc/opt/quest/vas/sas9.keytab for Active Directory object test-sas9
Adding entries to /etc/opt/quest/vas/sas9.keytab for:
sas9/test.example.com@EXAMPLE.COM EncryptionType: aes256-cts-hmac-sha1-96
sas9/test.example.com@EXAMPLE.COM EncryptionType: aes128-cts-hmac-sha1-96
sas9/test.example.com@EXAMPLE.COM EncryptionType: arcfour-hmac-md5
checking new service keytab file exists .................................................................... found
Can root read /etc/opt/quest/vas/sas9.keytab ............................................................... yes
checking test-sas9 can request a service ticket for test-sas9@EXAMPLE.COM .............................. yes
checking test-sas9 can request a service ticket for sas9/test.example.com@EXAMPLE.COM .................. yes