Installation and Operation Manual

Table Of Contents
TD 92579EN
10 April 2015 / Ver. N
Installation and Operation Manual
IP-DECT Base Station & IP-DECT Gateway (software version 7.2.X)
36
26 In the Authentication Servers section and the Realm/Domain text field, enter the
realm name of the AD server (see step 9). Must be capital letters.
Note: This has not to be done if a DNS server has been configured to be used in the
IP-DECT system. In this case the clients will look up the needed information
automatically.
27 In the Address text field, enter the IP address of the AD server.
28 Click "OK".
Log in using Kerberos cross-realm authentication
1 Make sure that secure HTTPS protocol is used when logging in.
2 Login on the client using a Windows server account. When prompted for user
name, the name of the Windows domain has to be entered in front of the user
name, separated by a backslash in the following way: DOMAIN\username or
username@DOMAIN.
Configure secondary Kerberos server
The Kerberos server is crucial when using Kerberos authentication, so it is recommended
to have a secondary Kerberos server in the IP-DECT system. The secondary server is used if
the primary server is not working properly. It is recommended to set up the secondary
Kerberos server on the Standby Master. To configure an IPBS/IPBL as a secondary Kerberos
server, do the following:
1 Make sure that the IP address of a NTP time server is specified. Select General >
NTP.
2 Select General > Kerberos.
3 Enter the root password for the secondary Kerberos server which should be the
same as the password used for the primary server. This password is used to encrypt
the information stored on the server.
4 Click "OK".
5 The secondary Kerberos server is enabled. Enter the realm name in the Realm field.
6 LDAP is used to replicate the primary server database. Enter the IP address of the
primary Kerberos server in the Master field in the LDAP Replication section. For
more information about LDAP, see
4.4 LDAP on page 47.
7 Select the Enable check box.
8 Select the TLS check box.
9 Click "OK".
10 Click "OK" again to perform the LDAP replication.
Each client must also be configured with the secondary server information.
11 Select General > Admin.
12 Go to the Authentication Servers section.
13 In the Secondary Address text field, enter the IP address of the secondary Kerberos
server. In the secondary Kerberos server enter 127.0.0.1 (localhost) as the IP
address. The Secondary Port and the Secondary Admin Port text fields are filled out
automatically with default ports. Note: If other than default ports are used, in the
text fields replace the default ports with the other ports.
14 Click "OK".