HP CIFS Server 3.0k Administrator's Guide version A.02.04
wbinfo Utility......................................................................................................................................125
8 Kerberos Support.......................................................................................................127
Introduction........................................................................................................................................127
Kerberos Overview.............................................................................................................................127
Kerberos CIFS Authentication Example........................................................................................128
HP-UX Kerberos Application Co-existence........................................................................................128
Components for Kerberos Configuration......................................................................................129
Configuring kerb5.keytab..............................................................................................................129
Kerberos Modification for Internet Services..................................................................................131
9 HP CIFS Deployment Models...................................................................................133
Introduction........................................................................................................................................133
Samba Domain Model.........................................................................................................................133
Samba Domain Components.........................................................................................................136
HP CIFS Server Acting as a PDC..............................................................................................136
HP CIFS Server Acting as a BDC..............................................................................................136
HP CIFS Acting as the Member Server....................................................................................137
An example of the Samba Domain Model.....................................................................................137
A Sample smb.conf File For a PDC..........................................................................................137
Configuration Options.............................................................................................................138
A Sample smb.conf File For a BDC..........................................................................................139
Configuration Options.............................................................................................................139
A Sample smb.conf File for a Domain Member Server............................................................139
Configuration Options.............................................................................................................140
A Sample /etc/nsswitch.ldap File.............................................................................................140
Windows Domain Model....................................................................................................................141
Components for Windows Domain Model...................................................................................142
An Example of the ADS Domain Model.......................................................................................142
A sample smb.conf file For an HP CIFS ADS Member Server.................................................143
A Sample /etc/krb5.conf File.....................................................................................................144
A Sample /etc/nsswitch.conf File..............................................................................................145
An Example of Windows NT Domain Model...............................................................................146
A Sample smb.conf File for an HP CIFS Member Server.........................................................146
Unified Domain Model.......................................................................................................................147
Unified Domain Components........................................................................................................148
HP CIFS Acting as a Windows 200x ADS Member Server......................................................148
Setting up the Unified Domain Model..........................................................................................148
Setting up LDAP-UX Client Services on an HP CIFS Server........................................................149
Installing and Configuring LDAP-UX Client Services on an HP CIFS Server........................149
Configuring /etc/krb5.conf to Authenticate Using Kerberos...................................................149
Installing SFU 3.5 on a Window 2000 or 2003 Domain Controller................................................150
An Example of the Unified Domain Model...................................................................................150
A sample smb.conf file For an HP CIFS Member Server.........................................................150
A Sample /etc/krb5.conf File.....................................................................................................151
A Sample /etc/nsswitch.conf File..............................................................................................152
10 Securing HP CIFS Server.........................................................................................153
Security Protection Methods...............................................................................................................153
Restricting Network Access...........................................................................................................153
Using Host Restrictions............................................................................................................153
An Example.........................................................................................................................153
Using Interface Protection........................................................................................................153
Table of Contents 7