Integrate Logins with HP CIFS Server, HP-UX, and Windows 2003R2/2008
3
Table of Contents
Legal Notices ................................................................................................................................... 2
Table of Contents ................................................................................................................................. 3
Introduction ......................................................................................................................................... 5
Overview ............................................................................................................................................ 6
Solution Components ........................................................................................................................... 7
Unified Login Solution Configuration .................................................................................................... 10
Windows Identity Management for UNIX Installation .......................................................................... 10
Configure Users and Groups ........................................................................................................... 12
Milestone 1 ............................................................................................................................... 14
Configure HP CIFS Server ............................................................................................................... 15
Milestone 2 ............................................................................................................................... 18
Configure LDAP-UX Client ............................................................................................................... 19
Step 1 – Proxy Account ............................................................................................................... 19
Step 2 – Run Setup ..................................................................................................................... 20
Step 3 – Edit ldapux_client.conf ................................................................................................... 31
Step 4 – Edit nsswitch.conf .......................................................................................................... 31
Step 5 – Test for Active Directory Users ......................................................................................... 31
Milestone 3 ............................................................................................................................... 32
Configure PAM Kerberos ................................................................................................................ 33
Step 1 – Configure /etc/krb5.conf ............................................................................................... 33
Step 2 – Configure Pluggable Authentication Module for Kerberos ................................................... 34
Step 3 – Verify Kerberos Logins.................................................................................................... 35
Milestone 4 ............................................................................................................................... 36
Solution Operation ............................................................................................................................ 37
HP CIFS Server Example ................................................................................................................. 37
HP-UX Login Example ..................................................................................................................... 41
HP-UX Secure Internet Services Example............................................................................................ 43
ftp Example ............................................................................................................................... 43
rlogin Example ........................................................................................................................... 45
telnet Example ........................................................................................................................... 45
HP-UX Secure Shell Example (SSH) ................................................................................................... 47
Configuration ............................................................................................................................. 47
ssh Example ............................................................................................................................... 48
Appendices....................................................................................................................................... 49
Appendix A: Reference Documents ................................................................................................. 49
Appendix B: Tools .......................................................................................................................... 50
Microsoft adsiedit.exe ................................................................................................................. 50
Wireshark ................................................................................................................................. 50
Microsoft kerbtray and klist .......................................................................................................... 50
Microsoft ktpass.exe ................................................................................................................... 50
Appendix C: Access Control Lists (ACLs) ........................................................................................... 51
User Data .................................................................................................................................. 51
Group Data ............................................................................................................................... 52
Summary ................................................................................................................................... 59
Appendix D: Configuring For Availability ......................................................................................... 60
HP CIFS Server ........................................................................................................................... 60
Kerberos ................................................................................................................................... 60
LDAP-UX .................................................................................................................................... 60
Appendix E: Windows Server 2008 Identity Management for Unix Screen Shots ................................. 61
Appendix F: CIFS Server A.02.04 (Samba 3.0.30) Kerberos Service Principals ................................... 64










