Skip to content

Commit 76b8c73

Browse files
authored
Change default value update date for Kerberos KDC
Updated the default value change date for Kerberos KDC configuration from July 2026 to April 2026.
1 parent 5cc067a commit 76b8c73

1 file changed

Lines changed: 3 additions & 3 deletions

File tree

support/windows-server/windows-security/kerberos-protocol-registry-kdc-configuration-keys.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -281,10 +281,10 @@ The registry entries that are listed in this section must be added to the follow
281281
- Possible values:
282282

283283
The default value is 0x27 (DES, RC4, AES session keys). We recommend setting the value to 0x3C for increased security, as this value allows for both AES-encrypted tickets and AES session keys. If you move to an AES-only environment where RC4 isn't used for the Kerberos protocol, we recommend setting the value to 0x38.
284-
285-
> [!IMPORTANT]
286-
> After applying the July 2026 Windows updates the default value will be changed to 0x18 (AES-SHA1). For additional information please see [How to manage Kerberos KDC usage of RC4 for service account ticket issuance changes related to CVE-2026-20833](https://support.microsoft.com/topic/how-to-manage-kerberos-kdc-usage-of-rc4-for-service-account-ticket-issuance-changes-related-to-cve-2026-20833-1ebcda33-720a-4da8-93c1-b0496e1910dc)
287284

288285
This value sets AES as the default encryption type for session keys on accounts that aren't marked with a default encryption type.
289286

290287
For more information, see [KB5021131: How to manage the Kerberos protocol changes related to CVE-2022-37966](https://support.microsoft.com/topic/kb5021131-how-to-manage-the-kerberos-protocol-changes-related-to-cve-2022-37966-fd837ac3-cdec-4e76-a6ec-86e67501407d).
288+
289+
> [!IMPORTANT]
290+
> After applying the April 2026 Windows updates the default value will be changed to 0x18 (AES-SHA1). For additional information please see [How to manage Kerberos KDC usage of RC4 for service account ticket issuance changes related to CVE-2026-20833](https://support.microsoft.com/topic/how-to-manage-kerberos-kdc-usage-of-rc4-for-service-account-ticket-issuance-changes-related-to-cve-2026-20833-1ebcda33-720a-4da8-93c1-b0496e1910dc)

0 commit comments

Comments
 (0)