I've added a Win8 machine to my production AD domain to test some of our processes on it. The domain serves a single department of a large organisation. The organisation does not run AD but does run a Kerberos realm. A trust exists between the two. An existing
GPO allows the following encryption types for Kerberos:
DES-CBC-CRC,DES-CBC-MD5,RC4-HMAC_MD5,AES128-CTS-HMAC-SHA1,AES256-CTS-HMAC-SHA1,Future encryption types
Passwords for AD domain user accounts are not sync'd with the Kerberos Realm and are not disclosed to users. An existing GPO applies the Kerberos principles and sets the Kerberos realm as the default domain for logon. So when Kerberos username and password
are submitted to the Win8 machine, the user is correctly authenticated by the Kerberos realm and authorized by the AD domain.
All is as it should be and ever was. Until the user's session is locked and they attempt to unlock it, whereupon
Win8 prompts for the AD domain password which is not disclosed to users!
* Cue switchboard overloaded with calls from thousands of locked-out users just back from lunch! *
Dear Mr. Ballmer, please put your best people on this now. Thanks, Mark