Organizations may receive notification of upcoming Microsoft security enforcement regarding Kerberos encryption.
Customers using AutoSys Workload Automation, Web UI (WCC), and Embedded Entitlements Manager (EEM) need to verify if their environment is susceptible to outages caused by this change.
Microsoft is deprecating weak encryption algorithms (RC4) in favor of more secure AES-based encryption for Active Directory and LDAP authentication. If an application or its management component (like iGateway) is explicitly configured to use or allow only RC4, authentication will fail once the enforcement is active.
Verify iGateway Configuration (EEM)
iGateway is a common component that handles communication for EEM. Check the igateway.conf file to ensure RC4 is explicitly excluded.
-ALL:HIGH:MEDIUM:!RC4:!RC2:!DES:!3DES:!IDEA:+TLSv1.2:@STRENGTH
Cipher String Breakdown:
| -ALL: | Clears the initial list of ciphers. |
| HIGH:MEDIUM: | Includes only high and medium-strength ciphers. |
| !RC4: | Explicitly disables and removes all RC4-based ciphers. |
| !RC2:!DES:!3DES:!IDEA: | Disables other weak or deprecated ciphers. |
| +TLSv1.2: | Ensures TLS 1.2 is prioritized. |
| @STRENGTH: | Instructs OpenSSL to sort the final list by encryption strength (highest bits first). |
Verify Other Components
$AUTOUSER/config.$AUTOSERV (Linux/Unix) or registry settings (Windows) to ensure no legacy encryption overrides are present.connection.properties and the Tomcat wrapper.conf to verify the Java Runtime Environment (JRE) is not restricted to legacy ciphers.