📄 secrets_dc.ldif
字号:
dn: flatname=${DOMAIN},CN=Primary DomainsobjectClass: topobjectClass: primaryDomainobjectClass: kerberosSecretflatname: ${DOMAIN}realm: ${REALM}secret:: ${MACHINEPASS_B64}secureChannelType: 6sAMAccountName: ${NETBIOSNAME}$msDS-KeyVersionNumber: 1objectSid: ${DOMAINSID}privateKeytab: ${SECRETS_KEYTAB}# A hook from our credentials system into HDB, as we must be on a KDC,# we can look directly into the database.dn: samAccountName=krbtgt,flatname=${DOMAIN},CN=PrincipalsobjectClass: topobjectClass: secretobjectClass: kerberosSecretflatname: ${DOMAIN}realm: ${REALM}sAMAccountName: krbtgtobjectSid: ${DOMAINSID}servicePrincipalName: kadmin/changepwkrb5Keytab: HDB:ldb:${SAM_LDB}:#The trailing : here is a HACK, but it matches the Heimdal format. # A hook from our credentials system into HDB, as we must be on a KDC,# we can look directly into the database.dn: servicePrincipalName=DNS/${DNSDOMAIN},CN=PrincipalsobjectClass: topobjectClass: secretobjectClass: kerberosSecretrealm: ${REALM}servicePrincipalName: DNS/${DNSDOMAIN}msDS-KeyVersionNumber: 1privateKeytab: ${DNS_KEYTAB}secret:: ${DNSPASS_B64}
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -