After successful execution, verify that all required objects were created correctly in both Entra ID and Active Directory.
# Check the Kerberos server configuration in Entra ID
$KerberosServer = Get-AzureADKerberosServer -Domain $Domain -UserPrincipalName $CloudUPN
$KerberosServer | Format-List Id, UserAccount, ComputerAccount, Domain, KeyVersion
Verify the Active Directory computer object:
$Computer = Get-ADComputer -Identity "AzureADKerberos" -Properties *
$Computer | Select-Object Name, DistinguishedName, ServicePrincipalNames, @{Name='EncryptionTypes';Expression={$_.'msDS-SupportedEncryptionTypes'}}
Check the Kerberos user account:
$User = Get-ADUser -Identity "krbtgt_AzureAD" -Properties *
$User | Select-Object Name, DistinguishedName, UserPrincipalName, Enabled
Verify the encryption types are properly configured:
Get-ADComputer -Identity "AzureADKerberos" -Properties msDS-SupportedEncryptionTypes | Select-Object Name, @{Name='EncryptionTypes';Expression={$_.'msDS-SupportedEncryptionTypes'}}
Pro tip: The msDS-SupportedEncryptionTypes value should be 28 (0x1C), which represents support for AES128, AES256, and RC4 encryption types.
Verification: All objects should exist with proper attributes. The computer object should be in the Domain Controllers OU, and the user account should be enabled.