I am trying to access resources inside an Active Directory domain from a non-domain joined Windows 10 machine. The domain is ad.example.com
, but there is also the alternative UPN suffix example.com
.
When I access, for example, a file share using a user with the default UPN suffix (e.g. [email protected]
), Kerberos authentication works, as it automatically guesses the correct realm (ad.example.com
), does the DNS resolution to figure out the the DC, does the LDAP ping, and then gets first the TGT and then the TGS.
When I try the same thing with a user using the non-default UPN suffix (e.g. [email protected]
), it tries to guess the realm as example.com
, which of course does not resolve in DNS. I fixed this by creating a DNAME record for _msdcs.example.com
to _msdcs.ad.example.com
and got the DNS part to work that way. The problem is that now the LDAP ping does still not work, as it, of course, queries for the Netlogon attribute of example.com
(which gives zero results) instead of ad.example.com
(which would give one result). This causes the authentication to fall back to NTLM, which I absolutely do not want, as I plan to disable NTLM entirely in the near future.
Is there any way to get Kerberos to work from non-domain joined machines when you are using non-default UPN suffixes?