HP CIFS Client A.02.02 Administrator's Guide
CIFS Security and Authentication
Using Kerberos with the HP CIFS Client
Chapter 3 49
http://www.isi.edu/gost/publications/kerberos-neuman-tso.html
• The documentation repository at Massachusetts Institute of
Technology (the developer of Kerberos):
http://web.mit.edu/kerberos
• The Kerberos specification, RFC 1510. An excellent introduction
(section 1) and descriptions of message exchanges (section 3):
http://ftp.rfc-editor.org/in-notes/rfc1510.txt
• Several informative papers can also be found at the Microsoft web
site. Most of these documentation also include practical infomation
on how you should set up security in networks of Windows
computers. Please search for kerberos or related topics at:
http://www.microsoft.com
Step 2. Set Up and Verify the Kerberos Infrastructure
In order to use Kerberos with the HP CIFS Client, you must first have a
working Kerberos infrastructure on your network including the HP-UX
host (independent of the CIFS Client). The Kerberos infrastructure
consists of:
• A Key Distribution Center (KDC)
• At least one CIFS server that supports Kerberos and is a member of
the KDC’s domain (called a “realm” in the Kerberos terminology)
• At least one user account on the KDC
• A properly configured HP-UX Kerberos Client installation on the
system running the HP CIFS Client
NOTE A domain name server (DNS) is recommended to be active on a Windows
server on your network. CIFS servers to which you want to connect
should be configured in the Windows DNS table in order to be recognized
by the KDC.
For information on setting up a Key Distribution Center on a Windows
2000 or 2003 server, refer to your Microsoft documentation.