Skip to content

TechDirectArchive

Hands-on IT, Cloud, Security & DevOps Insights

  • Home
  • About
  • Advertise With US
  • Reviews
  • Contact
  • Toggle search form
Home » Windows » Bidding Farewell to NTLM in favour of Kerberos
  • banner
    Various ways to restart an AWS EC2 instance AWS/Azure/OpenShift
  • wac
    Fix Windows Admin Center cannot be reached Windows
  • Docker Guide
    Pull and Deploy Nginx Container Images from Docker Hub AWS/Azure/OpenShift
  • Encryption
    How to encrypt Microsoft SQL Server Traffic Oracle/MSSQL/MySQL
  • Step to migrate from microsft SQl to PostgreSQL
    Migrate Veeam Configuration Database to PostgreSQL Server Backup
  • Domain
    Connectivity to a writable domain controller from a node could not be determined because of an error Virtualization
  • How to Troubleshoot unable to install Office
    How to Troubleshoot Unable to Install Office Microsoft Exchange/Office/365
  • nested virtualization
    Enable the Virtual Machine Platform Windows Feature and ensure Virtualization is enabled in the BIOS Virtualization

Bidding Farewell to NTLM in favour of Kerberos

Posted on 15/10/202316/12/2024 Christian By Christian No Comments on Bidding Farewell to NTLM in favour of Kerberos
The evolution of Windows authentication - NTLM to Keberos

The NT LAN Manager (NTLM) is an authentication protocol encompassed in the Windows Msv1_0.dll. In this article, we shall discuss “Bidding Farewell to NTLM in favour of Kerberos”. The NTLM authentication protocols include LAN Manager versions 1 and 2, and NTLM versions 1 and 2. The NTLM authentication protocols authenticate users and computers based on a challenge/response mechanism that proves to a server or domain controller that a user knows the password associated with an account. Please see How to disable automatic Windows updates, and how to Clear Saved Email Address: How to stop Microsoft Edge from remembering your email ID.

At the time of writing this piece, NTLM authentication is still supported and must be used for Windows authentication with systems configured as a member of a workgroup. NTLM authentication can also be utilized for local logon authentication on non-domain controllers. Kerberos version 5 authentication is the preferred authentication method for Active Directory environments, but a non-Microsoft or Microsoft application might still use NTLM.

When NTLM protocol is utilized, a resource server must take one of the following actions to verify the identity of a PC or user whenever a new access token is required:

  • Contact a domain authentication service on the domain controller for the computer’s or user’s account domain, if the account is a domain account.
  • Look up the computer’s or user’s account in the local account database, if the account is a local account.

But Microsoft is shaking up the authentication game in its latest Windows 11 announcement. They’re saying goodbye to the old-timer “NTLM”, and embracing the Kerberos authentication protocol to its fullest.

It’s all in the name of amping up security and refining the user experience. Kindly take a look at the YouTube video from the Windows Authentication Platform team on Bidding Farewell to NTLM in favour of Kerberos.

NT LAN Manager (NTLM) – The End of an Era

NTLM, which debuted back in the ’90s. It offers a single sign-on magic with a sprinkle of challenge-response protocol. But as time went by, Kerberos took the centre stage since the entrance of Windows 2000.

Kerberos uses a two-step authentication process that leverages a ticket-granting service or key distribution centre. Want to read about “NTLM/Kerberos Authentication Extensions“?

With Kerberos, No more three-way handshakes between the client and server to authenticate a user as utilized in NTLM. Kerberos leverages encryption, while NTLM is still stuck in password-hashing.

Here is an excellent guide on how to Prevent NTLM credentials from being sent to remote servers. And Active Directory Authentication methods: How do Kerberos and NTLM work?

Security Makeover: Why the switch to Kerberos?

Outside NTLM’s security weaknesses. NTLM is vulnerable to relay attacks which enables intruders to eavesdrop on authentication attempts potentially allowing bad actors to gain unauthorized access to network resources. Kerberos promises a more secure, fortified authentication process.

Introducing IAKerb and KDC for Kerberos

As part of this grand transformation, Microsoft is introducing New features for Windows 11 including Initial and Pass Through Authentication Using Kerberos (IAKerb) and a local Key Distribution Center (KDC) for Kerberos thereby extending its superpowers of local accounts.

What’s Next for NTLM?

Now, you might be wondering, “What happens to NTLM?” Microsoft assures us that while they’re prepping for the grand farewell of NTLM in Windows 11, they’re also diligently addressing any hard-coded NTLM instances in its components in preparation for the shift to ultimately disable NTLM in Windows 11.

The aim is to enable users gently towards embracing Kerberos instead of holding on to NTLM.

Please see PetitPotam attack on Active Directory Certificate Services: How to mitigate NTLM Relay PetitPotam attack on AD CS, What to note when setting up Ansible to work with Kerberos, and Various Ansible Authentication Options.

Change Is Coming – Disable NTLM in Windows 11

Note: These changes are all set to be the new default, so no complex configurations are required for most situations. 

NTLM, though not as ostentatiously impressive as Kerberos, will still be hanging around as a fallback option as noted by Matthew Palko, Microsoft’s senior product management lead in Enterprise and Security, said. “NTLM will continue to be available as a fallback to maintain existing compatibility.

Reducing the use of NTLM will ultimately culminate in it being disabled in Windows 11. Microsoft is taking a data-driven approach and monitoring reductions in NTLM usage to determine when it will be safe to disable.

In the meantime, you can use the enhanced controls we are providing to get a head start. Once disabled by default, customers will also be able to use these controls to reenable NTLM for compatibility reasons

FAQ on NTLM and Kerberos?

What is NTLM (NT LAN Manager)?

NTLM is a proprietary authentication protocol used in Windows environments to verify the identity of users and computers attempting to access network resources.

Why is NTLM less secure than Kerberos?

NTLM has several security vulnerabilities, including susceptibility to pass-the-hash attacks and a lack of mutual authentication. Kerberos, on the other hand, offers stronger security through mutual authentication and the use of ticket

What is Kerberos authentication?

Kerberos is a network authentication protocol that uses secret-key cryptography to provide strong authentication for users and services.

How does Kerberos differ from NTLM?

Kerberos provides mutual authentication, meaning both the client and the server authenticate to each other. Additionally, Kerberos uses tickets for secure communication, while NTLM uses challenge-response mechanisms, making Kerberos generally more secure

The Core distinction between Kerberos and NTLM

The primary difference between NTLM and Kerberos is the need for connectivity to the domain controller. In Kerberos, the client must request a Kerberos ticket from the Key Distribution Center (KDC). Which is a process that resides on the domain controller. In NTLM, the server verifies the client’s NTLM credentials by contacting the domain controller.

This difference allows clients who do not have connectivity to the domain controller to authenticate with the server using NTLM authentication. This is the main reason for supporting NTLM in addition to the more secure and standard Kerberos authentication.

How would Kerberos resolve the above issue?

The “Initial and Pass Through Authentication Using Kerberos (IAKerb) and a local Key Distribution Center (KDC) for Kerberos” will be used to address these concerns.

IAKerb is a public extension to the industry standard Kerberos protocol that allows a client without line-of-sight to a Domain Controller to authenticate through a server that does have line-of-sight. This works through the Negotiate authentication extension and allows the Windows authentication stack to proxy Kerberos messages through the server on behalf of the client. IAKerb relies on the cryptographic security guarantees of Kerberos to protect the messages in transit through the server to prevent replay or relay attacks

The extensions to the Kerberos protocol and the GSS-API Kerberos mechanism enable a GSS-API Kerberos client to exchange messages with the KDC. It does this by using the GSS-API acceptor as a proxy, encapsulating the Kerberos messages inside GSS-API tokens.

With these extensions, a client can obtain Kerberos tickets for services where the KDC is not accessible to the client. But is accessible to the application server.

I hope you found this blog post helpful on Bidding Farewell to NTLM in favour of Kerberos. Please let me know in the comment session if you have any questions.

5/5 - (1 vote)

Thank you for reading this post. Kindly share it with others.

  • Click to share on X (Opens in new window) X
  • Click to share on Reddit (Opens in new window) Reddit
  • Click to share on LinkedIn (Opens in new window) LinkedIn
  • Click to share on Facebook (Opens in new window) Facebook
  • Click to share on Pinterest (Opens in new window) Pinterest
  • Click to share on Tumblr (Opens in new window) Tumblr
  • Click to share on Telegram (Opens in new window) Telegram
  • Click to share on WhatsApp (Opens in new window) WhatsApp
  • Click to share on Pocket (Opens in new window) Pocket
  • Click to share on Mastodon (Opens in new window) Mastodon
  • Click to share on Bluesky (Opens in new window) Bluesky
  • Click to share on Threads (Opens in new window) Threads
  • Click to share on Nextdoor (Opens in new window) Nextdoor
Windows, Windows Server Tags:Windows 10, Windows 11, Windows Server 2016

Post navigation

Previous Post: How to disable automatic Windows updates via Windows Settings
Next Post: What’s New? Install Windows Server 2025 on Beelink EQ12 PC

Related Posts

  • Capture 12
    How to Generate SSH Keys in Windows 10 Windows
  • TaskScheduler
    Fix Windows Task Scheduler Error 0x1 Windows
  • windows 10 lock screen
    How to reset your lost or forgotten Windows 10 Password Windows
  • Slide2 2
    Oracle VirtualBox: Installing Windows 11 without TPM Support Virtualization
  • image 78
    How to enable LDAP over SSL with a third-party Certificate such as DigiCert Windows
  • GNS 3
    Graphical Network Simulator: How to uninstall GNS3 in Windows Windows

More Related Articles

Capture 12 How to Generate SSH Keys in Windows 10 Windows
TaskScheduler Fix Windows Task Scheduler Error 0x1 Windows
windows 10 lock screen How to reset your lost or forgotten Windows 10 Password Windows
Slide2 2 Oracle VirtualBox: Installing Windows 11 without TPM Support Virtualization
image 78 How to enable LDAP over SSL with a third-party Certificate such as DigiCert Windows
GNS 3 Graphical Network Simulator: How to uninstall GNS3 in Windows Windows

Leave a Reply Cancel reply

You must be logged in to post a comment.

Microsoft MVP

VEEAMLEGEND

vexpert-badge-stars-5

Virtual Background

GoogleNews

Categories

veeaam100

sysadmin top30a
 
  • banner
    Various ways to restart an AWS EC2 instance AWS/Azure/OpenShift
  • wac
    Fix Windows Admin Center cannot be reached Windows
  • Docker Guide
    Pull and Deploy Nginx Container Images from Docker Hub AWS/Azure/OpenShift
  • Encryption
    How to encrypt Microsoft SQL Server Traffic Oracle/MSSQL/MySQL
  • Step to migrate from microsft SQl to PostgreSQL
    Migrate Veeam Configuration Database to PostgreSQL Server Backup
  • Domain
    Connectivity to a writable domain controller from a node could not be determined because of an error Virtualization
  • How to Troubleshoot unable to install Office
    How to Troubleshoot Unable to Install Office Microsoft Exchange/Office/365
  • nested virtualization
    Enable the Virtual Machine Platform Windows Feature and ensure Virtualization is enabled in the BIOS Virtualization

Subscribe to Blog via Email

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Join 1,841 other subscribers
  • RSS - Posts
  • RSS - Comments
  • About
  • Authors
  • Write for us
  • Advertise with us
  • General Terms and Conditions
  • Privacy policy
  • Feedly
  • Telegram
  • Youtube
  • Facebook
  • Instagram
  • LinkedIn
  • Tumblr
  • Pinterest
  • Twitter
  • mastodon

Tags

AWS Azure Bitlocker Microsoft Windows PowerShell WDS Windows 10 Windows 11 Windows Deployment Services Windows Server 2016

Copyright © 2025 TechDirectArchive

 

Loading Comments...
 

You must be logged in to post a comment.