Skip to content

Commit 347d205

Browse files
update domain name
1 parent f9c74da commit 347d205

File tree

1 file changed

+3
-3
lines changed

1 file changed

+3
-3
lines changed

articles/bastion/kerberos-authentication-portal.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -417,14 +417,14 @@ This template does the following:
417417
- Bastion, Bastion-ip
418418
- ClientVM, ServerVM
419419
- Have the DNS Server of the VNET point to the private IP address of the Server-vm (domain controller). This is required for the target ClientVM to successfully domain-join to the Domain Controller (ServerVM).
420-
- Runs a Custom Script Extension on the ServerVM to promote it to a domain controller with domain name: `<domain-name-specified-in-deployment.json-file>`
420+
- Runs a Custom Script Extension on the ServerVM to promote it to a domain controller with domain name: `bastionkrb.test`
421421
- Runs a Custom Script Extension on the ClientVM to have it:
422422
- **Restrict NTLM: Incoming NTLM traffic** = Deny all domain accounts (this is to ensure Kerberos is used for authentication)
423-
- Domain-join the `<domain-name-specified-in-deployment.json-file>` domain
423+
- Domain-join the `bastionkrb.test` domain
424424

425425
Login to ClientVM using Bastion with Kerberos authentication:
426426
- Make sure to have the `Kerberos` feature enabled on the bastion
427-
- Login to ClientVM with Bastion using credentials: username = `serveruser@<domain-name-specified-in-deployment.json-file>` and password = `<password-used-in-deployment.json>`
427+
- Login to ClientVM with Bastion using credentials: username = `serveruser@bastionkrb.test` and password = `<password-used-in-deployment.json>`
428428

429429

430430
## Next steps

0 commit comments

Comments
 (0)