HP CIFS Server 3.0i Administrator's Guide version A.02.03.03
wbinfo Utility......................................................................................................................................121
8 Kerberos Support.......................................................................................................123
Introduction........................................................................................................................................123
Kerberos Overview.............................................................................................................................123
Kerberos CIFS Authentication Example........................................................................................124
HP-UX Kerberos Application Co-existence........................................................................................124
Components for Kerberos Configuration......................................................................................125
Configuring kerb5.keytab..............................................................................................................125
Kerberos Modification for Internet Services..................................................................................127
9 HP CIFS Deployment Models...................................................................................129
Introduction........................................................................................................................................129
Samba Domain Model.........................................................................................................................129
Samba Domain Components.........................................................................................................132
HP CIFS Server Acting as a PDC..............................................................................................132
HP CIFS Server Acting as a BDC..............................................................................................132
HP CIFS Acting as the Member Server....................................................................................133
An example of the Samba Domain Model.....................................................................................133
A Sample smb.conf File For a PDC..........................................................................................133
Configuration Options.............................................................................................................134
A Sample smb.conf File For a BDC..........................................................................................135
Configuration Options.............................................................................................................135
A Sample smb.conf File for a Domain Member Server............................................................135
Configuration Options.............................................................................................................136
A Sample /etc/nsswitch.ldap File.............................................................................................136
Windows Domain Model....................................................................................................................137
Components for Windows Domain Model...................................................................................138
An Example of the ADS Domain Model.......................................................................................138
A sample smb.conf file For an HP CIFS ADS Member Server.................................................139
A Sample /etc/krb5.conf File.....................................................................................................140
A Sample /etc/nsswitch.conf File..............................................................................................141
An Example of Windows NT Domain Model...............................................................................142
A Sample smb.conf File for an HP CIFS Member Server.........................................................142
Unified Domain Model.......................................................................................................................143
Unified Domain Components........................................................................................................144
HP CIFS Acting as a Windows 200x ADS Member Server......................................................144
Setting up the Unified Domain Model..........................................................................................144
Setting up LDAP-UX Client Services on an HP CIFS Server........................................................145
Installing and Configuring LDAP-UX Client Services on an HP CIFS Server........................145
Configuring /etc/krb5.conf to Authenticate Using Kerberos...................................................145
Installing SFU 3.5 on a Window 2000 or 2003 Domain Controller................................................146
An Example of the Unified Domain Model...................................................................................146
A sample smb.conf file For an HP CIFS Member Server.........................................................146
A Sample /etc/krb5.conf File.....................................................................................................147
A Sample /etc/nsswitch.conf File..............................................................................................148
10 Securing HP CIFS Server.........................................................................................149
Security Protection Methods...............................................................................................................149
Restricting Network Access...........................................................................................................149
Using Host Restrictions............................................................................................................149
An Example.........................................................................................................................149
Using Interface Protection........................................................................................................149
Table of Contents 7