SAP Knowledge Base Article - Preview

3728560 - SAP Cloud connector - kerberos encryption key remains rc4-hmac after attempting to change to aes256-sha1 in cloud connector

Symptom

  • After executing the command "ktpass /princ d0041s@LE.GRP /pass XXXXX# /out c:\lag\data\Keytab\d0041s_AES256_VNO10.keytab /mapUser d0041s@le.grp /crypto AES256-SHA1 /ptype KRB5_NT_PRINCIPAL", the generated keytab file still shows the encryption key as "rc4-hmac" instead of "aes256-cts-hmac-sha1-96".
  • The issue occurs in the Kerberos encryption key section of the Cloud Connector On-Premise configuration.


Read more...

Environment

  • SAP Cloud Connector 2.18.2 and lower version.

Product

CONNECTOR FRAMEWORK all versions

Keywords

kerberos, encryption key, rc4-hmac, aes256-sha1, cloud connector, keytab, ktpass command, active directory, aes256-cts-hmac-sha1-96, GPO, kerberos configuration, on-premise connectivity, Cloud Connector version upgrade , KBA , BC-MID-SCC , SAP Cloud Connector On-Demand/On-Premise Connectivity , Problem

About this page

This is a preview of a SAP Knowledge Base Article. Click more to access the full version on SAP for Me (Login required).

Search for additional results

Visit SAP Support Portal's SAP Notes and KBA Search.