This article provides instructions on configuring the SYNERGIX AD Client Extensions Kerberos Tickets Management feature to refresh Kerberos Tickets soon after the user or computer object security group membership is updated.
- Microsoft Windows 7.0 or
- Microsoft Windows 8.1 or
- Microsoft Windows 10 or
- Microsoft Windows Server 2008 & R2 or
- Microsoft Windows Server 2012 & R2 or
- Microsoft Windows Server 2016
- .NET Framework 4.0
Active Directory Domain Environment
SYNERGIX AD Client Extensions software enables the listener component that monitors security group membership changes on the user object or computer object. You may allow the software to listen to change on multiple domain controllers ( up to 20 DCs ) or specific domain controller.
- Log into a domain computer with a user account that has privileges to modify Group Policy Objects in Active Directory.
- From Windows Start button, select Programs \ Administrative Tools and launch “Group Policy Management Console” program or run GPMC.MSC.
- If you are operating Windows 7.0 domain computer, you must have RSAT installed to start GPMC.MSC
- If you are operating Windows XP domain computer, you must have Group Policy Management console installed.
- Select the Group Policy Object used to configure SYNERGIX AD Client Extensions settings.
- Right mouse click on the Group Policy Object and then, from the context menu, select EDIT item.
- In Group Policy Editor, expand Computer Configuration \ Administrative Templates \ Synergix AD Client Extensions \ Security Settings
- Select “Kerberos Tickets Management” group policy setting. Double click on the setting to bring up properties dialog box.
- Select “Enabled” radio button to enable and then, configure feature settings.
- Select “Purge Kerberos Tickets Upon User Membership Change”
- Select “Purge Kerberos Tickets Upon Compuer Membership Change”
- Optionally, select “Display Notification to User”
- Set “Recycle Notification Interval ( in min )” to 60 (default value)
- Under “Domain Controllers to bind to for listening, type the FQDN of the Active Directory domain. You can enter specific domain controller FQDN or multiple domain controllers FQDN.
- When the FQDN of the Active Directory domain is used, the feature will listen to max 20 DCs in the domain.
- To limit the listener to one DC only, use FQDN of specific DC. In such cases, the user object or computer object may be updated (group membership updates) on the specified DC only.
- When entering multiple domain controllers’ FQDN, you may use a semi colon ‘;’ character to separate the entries.
- Close Group Policy Editor.
- Wait for replication cycle to complete and for the Group Policy Object changes to replicate on all domain controllers.
- Log into your workstation.
- Run GPUPDATE /force command to force down the policy changes.
- Launch REGEDIT and check the entries under HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Synergix\ADCE\Security Settings\Advanced Kerberos Tickets Management.
- If the registry entries are present, it confirm the policy changes were applied. If not, wait until the policy changes are applied before proceeding with next step.
- Close AD Client Extensions client applications. From the system tray icon, hover over the ADCE icon, right mouse click on it and close the client application.
- From Program Files\Synergix\ADCE, locate the client application executable and start it again.
- When the client application is relaunched, it will listen to changes that occur on computer and on user object.
- Pass or
- Complete the Test Environment worksheet
- Upload test results document file to software test repository
- Upload log files
Test Results Submission
- Output of GPRESULTS.EXE /V command
Note: You must use ADCE \ Help \ Submit Log Files button to zip up above 3 files and submit