HP CIFS Client A.02.02 Administrator's Guide
CIFS Security and Authentication
Using Kerberos with the HP CIFS Client
Chapter 348
Using Kerberos with the HP CIFS Client
These procedures should be followed to use Kerberos with the HP CIFS
Client:
Step 1. Review fundamental Kerberos operating principals
Step 2. Set up and verify the Kerberos infrastructure
Step 3. Configure Kerberos in the HP CIFS Client
Step 1. Review fundamental Kerberos Operating
Principals
If you are not familiar with the fundamental features and operation of
Kerberos, consult one or more of the following references.
These HP-UX resources explain the essentials of Kerberos (in the
respective Overview chapters in each manual). This level of detail may be
sufficient for most installations.
• Configuration Guide for Kerberos Client Products on HP-UX:
http://docs.hp.com/hpux/onlinedocs/T1417-90005/T1417-90005.ht
ml
• Installing, Configuring and Administering the Kerberos Server on
HP-UX 11i:
http://docs.hp.com/hpux/onlinedocs/T1417-90001/T1417-90001.ht
ml
• Installing, Configuring and Administering the Kerberos Server V 2.0
on HP-UX 11i:
http://docs.hp.com/hpux/onlinedocs/T1417-90003/T1417-90003.ht
ml
Other HP-UX resources can be found by searching for kerberos at
http://docs.hp.com
In-depth discussion of the Kerberos protocol can be found in the
following excellent documentation:
• Kerberos: An Authentication Service for Computer Networks, B.
Clifford Neuman and Theodore Ts’o: