Home
%3CLINGO-SUB%20id%3D%22lingo-sub-570914%22%20slang%3D%22en-US%22%3ESCCM%3A%20%22The%20encryption%20type%20requested%20is%20not%20supported%20by%20the%20KDC%22%20Error%20When%20Running%20Reports%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-570914%22%20slang%3D%22en-US%22%3E%3CP%3E%3CSTRONG%3E%20First%20published%20on%20TECHNET%20on%20Jan%2029%2C%202019%20%3C%2FSTRONG%3E%20%3CBR%20%2F%3E%3CBR%20%2F%3E%3CBR%20%2F%3E%3C%2FP%3E%0A%3CH2%20id%3D%22toc-hId-1736963080%22%20id%3D%22toc-hId-1736963080%22%3E%3CSTRONG%3E%20Introduction%20%3CBR%20%2F%3E%3C%2FSTRONG%3E%3C%2FH2%3E%0A%3CP%3E%3CBR%20%2F%3EHello%2C%20my%20name%20is%20Richard%20McIver%20and%20I'm%20a%20Premier%20Field%20Engineer%20with%20Microsoft%20specializing%20in%20System%20Center%20Configuration%20Manager.%20%3CBR%20%2F%3E%3CBR%20%2F%3EI%20was%20recently%20working%20with%20a%20customer%20who%20suddenly%20started%20receiving%20a%20strange%20KDC%20error%20when%20attempting%20to%20run%20Configuration%20Manager%20reports%20from%20either%20within%20the%20Administration%20Console%20or%20the%20Reporting%20Services%20web%20portal.%20It%20took%20quite%20a%20bit%20of%20troubleshooting%20to%20isolate%20the%20root%20cause%2C%20so%20I'd%20just%20like%20to%20share%20our%20findings%20and%20resolution%20steps.%20%3CBR%20%2F%3E%3CBR%20%2F%3E%3CBR%20%2F%3E%3C%2FP%3E%0A%3CH2%20id%3D%22toc-hId--815193881%22%20id%3D%22toc-hId--815193881%22%3E%3CSTRONG%3E%20Problem%20Description%20%3CBR%20%2F%3E%3C%2FSTRONG%3E%3C%2FH2%3E%0A%3CP%3E%3CBR%20%2F%3EWhen%20running%20Configuration%20Manager%20reports%20that%20rely%20on%20Role%20Based%20Access%20Control%20(RBAC)%2C%20SQL%20Server%20Reporting%20Services%20(SSRS)%20will%20attempt%20to%20communicate%20with%20Active%20Directory%20via%20Kerberos%20authentication%20to%20resolve%20the%20Security%20Identifier%20(SID)%20of%20the%20user.%20%3CBR%20%2F%3E%3CBR%20%2F%3EHowever%2C%20when%20this%20customer%20attempted%20to%20run%20reports%20with%20RBAC%20embedded%2C%20the%20following%20error%20was%20displayed%20and%20the%20report%20failed%20to%20load.%20%3CBR%20%2F%3E%3CBR%20%2F%3E%3CEM%3E%20The%20DefaultValue%20expression%20for%20the%20report%20parameter%20'UserTokenSIDs'%20contains%20an%20error%3A%20The%20encryption%20type%20requested%20is%20not%20supported%20by%20the%20KDC.%20(rsRuntimeErrorInExpression)%20%3C%2FEM%3E%20%3CBR%20%2F%3E%3CBR%20%2F%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20style%3D%22width%3A%20447px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F113476i5C3F8311C566E9F5%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20%2F%3E%3C%2FSPAN%3E%20%3CBR%20%2F%3E%3CBR%20%2F%3EThe%20customer%20environment%20was%20SQL%20Server%202016%20Reporting%20Services%20running%20on%20Windows%20Server%202012%20R2%2C%20however%20I've%20since%20been%20able%20to%20replicate%20this%20issue%20on%20Windows%20Server%202016%20as%20well.%20%3CBR%20%2F%3E%3CBR%20%2F%3E%3CBR%20%2F%3E%3C%2FP%3E%0A%3CH2%20id%3D%22toc-hId-927616454%22%20id%3D%22toc-hId-927616454%22%3E%3CSTRONG%3E%20Root%20Cause%20Analysis%20%3CBR%20%2F%3E%3C%2FSTRONG%3E%3C%2FH2%3E%0A%3CP%3E%3CBR%20%2F%3EWe%20eventually%20traced%20the%20root%20cause%20down%20to%20a%20security%20policy%20settings%20on%20the%20reporting%20point%20server%20that%20was%20recently%20configured%20via%20domain%20Group%20Policy%20Object%20(GPO).%3C%2FP%3E%0A%3CP%3E%3CEM%3E%20Computer%20Configuration%5CWindows%20Settings%5CSecurity%20Settings%5CLocal%20Policies%5CSecurity%20Options%5CNetwork%20security%3A%20Configure%20encryption%20types%20allowed%20for%20Kerberos%3A%20%3CSTRONG%3E%20AES128_HMAC_SH1%2C%20AES256_HMAC_SHA1%2C%20Future%20encryption%20types%20selected%3C%2FSTRONG%3E%20%3C%2FEM%3E%3C%2FP%3E%0A%3CP%3E%3CBR%20%2F%3EAs%20configured%2C%20this%20setting%20has%20the%20effect%20of%20limiting%20the%20encryption%20types%20allowed%20for%20Kerberos%20authentication%20from%20the%20reporting%20point%20server%20to%20only%20AES128%2C%20AES256%2C%20and%20Future%20encryption%20types.%20%3CBR%20%2F%3E%3CBR%20%2F%3EHowever%2C%20the%20service%20account%20used%20by%20the%20SQL%20Reporting%20Services%20service%20was%20not%20properly%20configured%20to%20support%20these%20algorithms.%20Instead%2C%20SSRS%20was%20attempting%20to%20authenticate%20using%20the%20RC4%20encryption%20type%2C%20which%20is%20no%20longer%20allowed%20on%20the%20server%2C%20resulting%20in%20the%20KDC%20error.%20%3CBR%20%2F%3E%3CBR%20%2F%3E%3CBR%20%2F%3E%3C%2FP%3E%0A%3CH2%20id%3D%22toc-hId--1624540507%22%20id%3D%22toc-hId--1624540507%22%3E%3CSTRONG%3E%20Remediation%20%3CBR%20%2F%3E%3C%2FSTRONG%3E%3C%2FH2%3E%0A%3CP%3E%3CBR%20%2F%3EIn%20this%20case%2C%20the%20error%20can%20be%20resolved%20in%20one%20of%20two%20ways.%20%3CBR%20%2F%3E%3CBR%20%2F%3E%3C%2FP%3E%0A%3COL%3E%0A%3COL%3E%0A%3CLI%3EEnable%20AES%20128-bit%20and%2For%20AES%20256-bit%20encryption%20for%20the%20SQL%20Reporting%20Services%20service%20account%3C%2FLI%3E%0A%3CLI%3EConfigure%20the%20%3CEM%3E%20Network%20security%3A%20Configure%20encryption%20types%20allowed%20for%20Kerberos%20%3C%2FEM%3E%20policy%20setting%20on%20the%20reporting%20point%20server%20to%20include%20the%20%3CEM%3E%20RC4_HMAC_MD5%20%3C%2FEM%3E%20encryption%20type%3C%2FLI%3E%0A%3C%2FOL%3E%0A%3C%2FOL%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3ESteps%20to%20enable%20AES%20encryption%20for%20the%20SQL%20Reporting%20Services%20service%20account%20%3CBR%20%2F%3E%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3E%3CBR%20%2F%3E%3CBR%20%2F%3E%3C%2FP%3E%0A%3COL%3E%0A%3COL%3E%0A%3CLI%3EOpen%20%3CEM%3E%20Active%20Directory%20Users%20and%20Computers%3C%2FEM%3E%3C%2FLI%3E%0A%3CLI%3EBrowse%20to%20the%20user%20account%20used%20by%20SQL%20Reporting%20Services%20on%20the%20affected%20server%3C%2FLI%3E%0A%3CLI%3ERight-click%20the%20user%20account%20and%20select%20%3CEM%3E%20Properties%3C%2FEM%3E%3C%2FLI%3E%0A%3CLI%3EClick%20on%20the%20%3CEM%3E%20Account%20%3C%2FEM%3E%20tab%3C%2FLI%3E%0A%3CLI%3EUnder%20%3CEM%3E%20Account%20options%20%3C%2FEM%3E%20%2C%20check%20the%20box%20next%20to%20one%20or%20both%20of%20the%20following%3A%3COL%3E%0A%3CLI%3E%3CEM%3EThis%20account%20supports%20Kerberos%20AES%20128%20bit%20encryption%20%3C%2FEM%3E%3C%2FLI%3E%0A%3CLI%3E%3CEM%3EThis%20account%20supports%20Kerberos%20AES%20256%20bit%20encryption%3C%2FEM%3E%3C%2FLI%3E%0A%3C%2FOL%3E%0A%3C%2FLI%3E%0A%3CLI%3EClick%20%3CEM%3E%20OK%3C%2FEM%3E%3C%2FLI%3E%0A%3C%2FOL%3E%0A%3C%2FOL%3E%0A%3CP%3E%3CBR%20%2F%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20style%3D%22width%3A%20479px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F113477i4709C3951256E28E%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CH3%20id%3D%22toc-hId--78243677%22%20id%3D%22toc-hId--78243677%22%3E%26nbsp%3B%3C%2FH3%3E%0A%3CH3%20id%3D%22toc-hId-1664566658%22%20id%3D%22toc-hId-1664566658%22%3E%3CSTRONG%3ESteps%20to%20configure%20the%20policy%20setting%20%3CEM%3E%20Network%20security%3A%20Configure%20encryption%20types%20allowed%20for%20Kerberos%3C%2FEM%3E%20%3CBR%20%2F%3E%3C%2FSTRONG%3E%3C%2FH3%3E%0A%3CP%3E%3CBR%20%2F%3EMethod%201%20-%20Local%20Security%20Policy%20%3CBR%20%2F%3E%3CBR%20%2F%3E%3C%2FP%3E%0A%3COL%3E%0A%3COL%3E%0A%3CLI%3EOn%20the%20affected%20server%2C%20open%20an%20elevated%20command%20prompt%3C%2FLI%3E%0A%3CLI%3EType%20%3CEM%3E%20SECPOL%20%3C%2FEM%3E%20and%20hit%20Enter%3C%2FLI%3E%0A%3CLI%3EIn%20the%20%3CEM%3E%20Local%20Security%20Policy%20%3C%2FEM%3E%20management%20console%2C%20expand%20%3CEM%3E%20Local%20Policies%20%3C%2FEM%3E%20and%20click%20on%20%3CEM%3E%20Security%20Options%3C%2FEM%3E%3C%2FLI%3E%0A%3CLI%3EScroll%20down%20in%20the%20left-hand%20pane%20until%20you%20find%20the%20setting%20%3CEM%3E%20Network%20security%3A%20Configure%20encryption%20types%20allowed%20for%20Kerberos%3C%2FEM%3E%3C%2FLI%3E%0A%3CLI%3ERight-click%20this%20setting%20and%20select%20%3CEM%3E%20Properties%3C%2FEM%3E%3C%2FLI%3E%0A%3CLI%3EIn%20the%20%3CEM%3E%20Local%20Security%20Settings%20%3C%2FEM%3E%20tab%2C%20check%20the%20box%20next%20to%20%3CEM%3E%20RC4_HMAC_MD5%20%3C%2FEM%3E%20%2C%20%3CEM%3E%20AES128_HMAC_SHA1%20%3C%2FEM%3E%20%2C%20%3CEM%3E%20AES256_HMAC_SHA1%20%3C%2FEM%3E%20%2C%20and%20%3CEM%3E%20Future%20encryption%20types%3C%2FEM%3E%3C%2FLI%3E%0A%3CLI%3EClick%20%3CEM%3E%20OK%3C%2FEM%3E%3C%2FLI%3E%0A%3C%2FOL%3E%0A%3C%2FOL%3E%0A%3CP%3E%3CBR%20%2F%3E%3CBR%20%2F%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20style%3D%22width%3A%20447px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F113478iA929E2C3AE0FD628%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20%2F%3E%3C%2FSPAN%3E%20%3CBR%20%2F%3EMethod%202%20-%20Group%20Policy%20Object%20(GPO)%20%3CBR%20%2F%3E%3CBR%20%2F%3E%3C%2FP%3E%0A%3COL%3E%0A%3COL%3E%0A%3CLI%3EOpen%20the%20%3CEM%3E%20Group%20Policy%20Management%20%3C%2FEM%3E%20console%20and%20edit%20a%20new%20or%20existing%20GPO%3C%2FLI%3E%0A%3CLI%3EIn%20the%20%3CEM%3E%20Group%20Policy%20Management%20Editor%20%3C%2FEM%3E%20%2C%20expand%20%3CEM%3E%20Computer%20Configuration%5CPolicies%5CWindows%20Settings%5CSecurity%20Settings%5CLocal%20Policies%5CSecurity%20Options%3C%2FEM%3E%3C%2FLI%3E%0A%3CLI%3ERight-click%20on%20%3CEM%3E%20Network%20security%3A%20Configure%20encryption%20types%20allowed%20for%20Kerberos%20%3C%2FEM%3E%20and%20click%20%3CEM%3E%20Properties%3C%2FEM%3E%3C%2FLI%3E%0A%3CLI%3EOn%20the%20%3CEM%3E%20Security%20Policy%20Setting%20%3C%2FEM%3E%20tab%2C%20check%20the%20box%20to%20%3CEM%3E%20Define%20these%20policy%20settings%3C%2FEM%3E%3C%2FLI%3E%0A%3CLI%3ECheck%20the%20box%20next%20to%20%3CEM%3E%20RC4_HMAC_MD5%20%3C%2FEM%3E%20%2C%20%3CEM%3E%20AES128_HMAC_SHA1%20%3C%2FEM%3E%20%2C%20%3CEM%3E%20AES256_HMAC_SHA1%20%3C%2FEM%3E%20%2C%20and%20%3CEM%3E%20Future%20encryption%20types%3C%2FEM%3E%3C%2FLI%3E%0A%3CLI%3EClick%20%3CEM%3E%20OK%3C%2FEM%3E%3C%2FLI%3E%0A%3C%2FOL%3E%0A%3C%2FOL%3E%0A%3CP%3E%3CBR%20%2F%3E%3CBR%20%2F%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20style%3D%22width%3A%20473px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F113479i9AE0D531CEF475B1%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20%2F%3E%3C%2FSPAN%3E%20%3CBR%20%2F%3E%3CBR%20%2F%3EAnd%20that's%20about%20for%20now%E2%80%A6%20Hopefully%20this%20helps%20you%20out%2C%20and%20thanks%20for%20reading!%20%3CBR%20%2F%3E%3CBR%20%2F%3E%3CBR%20%2F%3E%3CBR%20%2F%3EReferences%3A%20%3CBR%20%2F%3E%3CBR%20%2F%3E%3C%2FP%3E%0A%3CUL%3E%0A%3CUL%3E%0A%3CLI%3E%3CA%20href%3D%22https%3A%2F%2Fblogs.msdn.microsoft.com%2Fopenspecification%2F2011%2F05%2F30%2Fwindows-configurations-for-kerberos-supported-encryption-type%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%22%3E%20https%3A%2F%2Fblogs.msdn.microsoft.com%2Fopenspecification%2F2011%2F05%2F30%2Fwindows-configurations-for-kerberos-supported-encryption-type%2F%26nbsp%3B%3C%2FA%3E%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3C%2FUL%3E%0A%3CUL%3E%0A%3CUL%3E%0A%3CLI%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fwindows%2Fsecurity%2Fthreat-protection%2Fsecurity-policy-settings%2Fnetwork-security-configure-encryption-types-allowed-for-kerberos%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%22%3E%20https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fwindows%2Fsecurity%2Fthreat-protection%2Fsecurity-policy-settings%2Fnetwork-security-configure-encryption-types-allowed-for-kerberos%20%3C%2FA%3E%20%3CBR%20%2F%3E%3CBR%20%2F%3E%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3C%2FUL%3E%3C%2FLINGO-BODY%3E%3CLINGO-TEASER%20id%3D%22lingo-teaser-570914%22%20slang%3D%22en-US%22%3E%3CP%3E%3CSPAN%20style%3D%22display%3A%20inline%20!important%3B%20float%3A%20none%3B%20background-color%3A%20%23ffffff%3B%20color%3A%20%23333333%3B%20cursor%3A%20text%3B%20font-family%3A%20inherit%3B%20font-size%3A%2016px%3B%20font-style%3A%20normal%3B%20font-variant%3A%20normal%3B%20font-weight%3A%20300%3B%20letter-spacing%3A%20normal%3B%20line-height%3A%201.7142%3B%20orphans%3A%202%3B%20text-align%3A%20left%3B%20text-decoration%3A%20none%3B%20text-indent%3A%200px%3B%20text-transform%3A%20none%3B%20-webkit-text-stroke-width%3A%200px%3B%20white-space%3A%20normal%3B%20word-spacing%3A%200px%3B%22%3EHello%2C%20my%20name%20is%20Richard%20McIver%20and%20I'm%20a%20Premier%20Field%20Engineer%20with%20Microsoft%20specializing%20in%20System%20Center%20Configuration%20Manager.%20%3C%2FSPAN%3E%3CBR%20style%3D%22box-sizing%3A%20border-box%3B%20color%3A%20%23333333%3B%20font-family%3A%20%26amp%3Bquot%3B%20segoeui%26amp%3Bquot%3B%2C%26amp%3Bquot%3Blato%26amp%3Bquot%3B%2C%26amp%3Bquot%3Bhelvetica%20neue%26amp%3Bquot%3B%2Chelvetica%2Carial%2Csans-serif%3B%20font-size%3A%2016px%3B%20font-style%3A%20normal%3B%20font-variant%3A%20normal%3B%20font-weight%3A%20300%3B%20letter-spacing%3A%20normal%3B%20orphans%3A%202%3B%20text-align%3A%20left%3B%20text-decoration%3A%20none%3B%20text-indent%3A%200px%3B%20text-transform%3A%20none%3B%20-webkit-text-stroke-width%3A%200px%3B%20white-space%3A%20normal%3B%20word-spacing%3A%200px%3B%22%20%2F%3E%3CBR%20style%3D%22box-sizing%3A%20border-box%3B%20color%3A%20%23333333%3B%20font-family%3A%20%26amp%3Bquot%3B%20segoeui%26amp%3Bquot%3B%2C%26amp%3Bquot%3Blato%26amp%3Bquot%3B%2C%26amp%3Bquot%3Bhelvetica%20neue%26amp%3Bquot%3B%2Chelvetica%2Carial%2Csans-serif%3B%20font-size%3A%2016px%3B%20font-style%3A%20normal%3B%20font-variant%3A%20normal%3B%20font-weight%3A%20300%3B%20letter-spacing%3A%20normal%3B%20orphans%3A%202%3B%20text-align%3A%20left%3B%20text-decoration%3A%20none%3B%20text-indent%3A%200px%3B%20text-transform%3A%20none%3B%20-webkit-text-stroke-width%3A%200px%3B%20white-space%3A%20normal%3B%20word-spacing%3A%200px%3B%22%20%2F%3E%3CSPAN%20style%3D%22display%3A%20inline%20!important%3B%20float%3A%20none%3B%20background-color%3A%20%23ffffff%3B%20color%3A%20%23333333%3B%20cursor%3A%20text%3B%20font-family%3A%20inherit%3B%20font-size%3A%2016px%3B%20font-style%3A%20normal%3B%20font-variant%3A%20normal%3B%20font-weight%3A%20300%3B%20letter-spacing%3A%20normal%3B%20line-height%3A%201.7142%3B%20orphans%3A%202%3B%20text-align%3A%20left%3B%20text-decoration%3A%20none%3B%20text-indent%3A%200px%3B%20text-transform%3A%20none%3B%20-webkit-text-stroke-width%3A%200px%3B%20white-space%3A%20normal%3B%20word-spacing%3A%200px%3B%22%3EI%20was%20recently%20working%20with%20a%20customer%20who%20suddenly%20started%20receiving%20a%20strange%20KDC%20error%20when%20attempting%20to%20run%20Configuration%20Manager%20reports%20from%20either%20within%20the%20Administration%20Console%20or%20the%20Reporting%20Services%20web%20portal.%20It%20took%20quite%20a%20bit%20of%20troubleshooting%20to%20isolate%20the%20root%20cause%2C%20so%20I'd%20just%20like%20to%20share%20our%20findings%20and%20resolution%20steps.%20%3C%2FSPAN%3E%3C%2FP%3E%3C%2FLINGO-TEASER%3E%3CLINGO-LABS%20id%3D%22lingo-labs-570914%22%20slang%3D%22en-US%22%3E%3CLINGO-LABEL%3ERichardMcIver%3C%2FLINGO-LABEL%3E%3C%2FLINGO-LABS%3E
Microsoft

First published on TECHNET on Jan 29, 2019


Introduction


Hello, my name is Richard McIver and I'm a Premier Field Engineer with Microsoft specializing in System Center Configuration Manager.

I was recently working with a customer who suddenly started receiving a strange KDC error when attempting to run Configuration Manager reports from either within the Administration Console or the Reporting Services web portal. It took quite a bit of troubleshooting to isolate the root cause, so I'd just like to share our findings and resolution steps.


Problem Description


When running Configuration Manager reports that rely on Role Based Access Control (RBAC), SQL Server Reporting Services (SSRS) will attempt to communicate with Active Directory via Kerberos authentication to resolve the Security Identifier (SID) of the user.

However, when this customer attempted to run reports with RBAC embedded, the following error was displayed and the report failed to load.

The DefaultValue expression for the report parameter 'UserTokenSIDs' contains an error: The encryption type requested is not supported by the KDC. (rsRuntimeErrorInExpression)



The customer environment was SQL Server 2016 Reporting Services running on Windows Server 2012 R2, however I've since been able to replicate this issue on Windows Server 2016 as well.


Root Cause Analysis


We eventually traced the root cause down to a security policy settings on the reporting point server that was recently configured via domain Group Policy Object (GPO).

Computer Configuration\Windows Settings\Security Settings\Local Policies\Security Options\Network security: Configure encryption types allowed for Kerberos: AES128_HMAC_SH1, AES256_HMAC_SHA1, Future encryption types selected


As configured, this setting has the effect of limiting the encryption types allowed for Kerberos authentication from the reporting point server to only AES128, AES256, and Future encryption types.

However, the service account used by the SQL Reporting Services service was not properly configured to support these algorithms. Instead, SSRS was attempting to authenticate using the RC4 encryption type, which is no longer allowed on the server, resulting in the KDC error.


Remediation


In this case, the error can be resolved in one of two ways.

    1. Enable AES 128-bit and/or AES 256-bit encryption for the SQL Reporting Services service account
    2. Configure the Network security: Configure encryption types allowed for Kerberos policy setting on the reporting point server to include the RC4_HMAC_MD5 encryption type

 

Steps to enable AES encryption for the SQL Reporting Services service account



    1. Open Active Directory Users and Computers
    2. Browse to the user account used by SQL Reporting Services on the affected server
    3. Right-click the user account and select Properties
    4. Click on the Account tab
    5. Under Account options , check the box next to one or both of the following:
      1. This account supports Kerberos AES 128 bit encryption
      2. This account supports Kerberos AES 256 bit encryption
    6. Click OK


 

Steps to configure the policy setting Network security: Configure encryption types allowed for Kerberos


Method 1 - Local Security Policy

    1. On the affected server, open an elevated command prompt
    2. Type SECPOL and hit Enter
    3. In the Local Security Policy management console, expand Local Policies and click on Security Options
    4. Scroll down in the left-hand pane until you find the setting Network security: Configure encryption types allowed for Kerberos
    5. Right-click this setting and select Properties
    6. In the Local Security Settings tab, check the box next to RC4_HMAC_MD5 , AES128_HMAC_SHA1 , AES256_HMAC_SHA1 , and Future encryption types
    7. Click OK




Method 2 - Group Policy Object (GPO)

    1. Open the Group Policy Management console and edit a new or existing GPO
    2. In the Group Policy Management Editor , expand Computer Configuration\Policies\Windows Settings\Security Settings\Local Policies\Security Options
    3. Right-click on Network security: Configure encryption types allowed for Kerberos and click Properties
    4. On the Security Policy Setting tab, check the box to Define these policy settings
    5. Check the box next to RC4_HMAC_MD5 , AES128_HMAC_SHA1 , AES256_HMAC_SHA1 , and Future encryption types
    6. Click OK





And that's about for now… Hopefully this helps you out, and thanks for reading!



References: