KRBTGT Rotation: Why It Matters
Understanding the KRBTGT account, why regular password rotation is critical, and how to perform it safely without breaking authentication.
KRBTGT Rotation: Why It Matters
The KRBTGT account is critical to Kerberos authentication. Regular password rotation is essential for security, especially after security incidents.
What is KRBTGT?
KRBTGT is a built-in account in Active Directory that is used by the Key Distribution Center (KDC) to encrypt and sign Kerberos Ticket Granting Tickets (TGTs). Every TGT issued by a domain controller is encrypted using the KRBTGT account's password hash.
Why Rotation Matters
Golden Ticket Attacks
If an attacker compromises the KRBTGT password hash, they can create "golden tickets" that allow authentication as any user, including Domain Admins, without knowing the actual user's password. This is extremely dangerous.
Incident Recovery
After a security incident where domain controllers may have been compromised, rotating KRBTGT invalidates any stolen TGTs and prevents attackers from creating new golden tickets.
Compliance
Many security frameworks and regulations require regular rotation of critical service account passwords, including KRBTGT.
When to Rotate
Regular rotation: Every 180 days (or per your organization's policy)
After security incidents: Immediately after any suspected domain controller compromise or after a penetration test or red team assessment that results in domain compromise
Before major changes: Before decommissioning domain controllers or making significant AD changes
How to Rotate Safely
Step 1: Prepare
- Ensure all domain controllers are healthy and replicating
- Verify time synchronization across all DCs
- Have a rollback plan
- Schedule during maintenance window if possible
Step 2: First Rotation
- Reset KRBTGT password using
Set-ADAccountPassword, a similar PowerShell cmdlet, or via the Active Directory Users and Computers console - Wait for replication to all domain controllers (check with
repadmin /replsummary) - Verify authentication still works
Step 3: Second Rotation (Critical)
After the first rotation, wait at least 10 hours (the maximum TGT lifetime), then rotate again. This ensures all old TGTs are invalidated.
Step 4: Verify
- Test authentication from multiple clients
- Check event logs for authentication failures
- Verify replication completed successfully
Common Mistakes
Single rotation: Only rotating once leaves a window where old TGTs may still be valid
Insufficient wait time: Not waiting long enough between rotations can cause authentication issues
No verification: Not testing authentication after rotation can lead to production outages
Poor timing: Rotating during business hours without testing can impact users
Best Practices
- Document the process: Have a written procedure for KRBTGT rotation
- Test in lab first: Practice the rotation process in a test environment
- Schedule appropriately: Rotate during maintenance windows when possible
- Monitor closely: Watch for authentication failures after rotation
- Automate if possible: Use scripts to ensure consistency
- Regular cadence: Rotate every 180 days, not just after incidents
- Incident response: Have a plan for immediate rotation after security incidents
Detection
Signs that KRBTGT may be compromised:
- Unusual authentication patterns
- Golden ticket usage (detected via monitoring)
- Domain controller compromise
- Security incident involving AD
If compromised, rotate immediately following the two-step process above.
Related Resources
Active Directory Security Hardening & Hygiene Checklist
This Active Directory security hardening and hygiene checklist covers the most common misconfigurations we see during internal penetration tests, giving you a practical way to reduce identity-driven attack chains and domain compromise risk across Active Directory.
AD Permissions and ACLs Explained
How Active Directory permissions and Access Control Lists work, common misconfigurations, and how to audit them effectively.
GPO Misconfigurations and Risk
Common Group Policy Object misconfigurations that create security risks: overly broad scope, permissive permissions, and legacy policies.
Need this validated in your environment?
Our Active Directory security assessment identifies these issues and provides prioritized remediation guidance.
Learn About AD Security Assessments