HP CIFS Server and Kerberos
10
A simple precaution is to check with the Windows domain administrator to verify the Kerberos realm
name.
4.2 Microsoft Active Directory Domain
No special config for Kerberos (KDC service must be started)
HP CIFS Server domain prerquisites:
NetBIOS enabled
Both native and mixed
Pre-Windows 2000 compatible
4.3 Joining the Windows Domain
The first step when joining the HP CIFS Server to the domain is to KINIT from the HP-UX command
line. Krb5.conf has configured the Windows KDC as the source for the credentials, so the KINIT
requests the “krbtgt” from the Windows domain KDC. The KDC is configured to require pre-
authentication data (timestamp), and the HP-UX Kerberos client is configured to not send pre-
authentication data initially, so the first Authentication Service Request is rejected. On the next
Request the pre-authentication data is supplied, and the KINIT succeeds.