Planning and Configuring HP DCE 1.8
Contents
9
Supported Templates for MC/ServiceGuard Integration with
DCE. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .109
Planning for the DCE Package . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .110
DCE Configuration for Integration with ServiceGuard. . . . . . . . . . .110
Summary of DCE-MC/ServiceGuard Installation and
Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .115
6. HP-UX Integrated Login
Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .118
Deciding Whether to Use HP-UX Integrated Login . . . . . . . . . . . . . . .120
Operation of Integrated Login Utilities . . . . . . . . . . . . . . . . . . . . . . . . .121
Activating HP-UX Integrated Login. . . . . . . . . . . . . . . . . . . . . . . . . . . .122
Deactivating HP-UX Integrated Login. . . . . . . . . . . . . . . . . . . . . . . . . .125
Inquiring about Authentication Policy. . . . . . . . . . . . . . . . . . . . . . . . . .126
Notes, Cautions, and Warnings. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .127
Integrating DCE with HP-UX Integrated Login . . . . . . . . . . . . . . . . . .129
Overview of HP-UX Integrated Login Features . . . . . . . . . . . . . . . . .129
Deciding Whether to Integrate DCE with HP-UX Integrated Login 129
Operation of the HP-UX Integrated Login Utilities. . . . . . . . . . . . . .130
Preparing to Integrate DCE with HP-UX Integrated Login . . . . . . .131
Configuring HP-UX Integrated Login with DCE . . . . . . . . . . . . . . . .133
Configuring ux as a Fallback Technology for DCE. . . . . . . . . . . . . . .134
Unconfiguring DCE from HP-UX Integrated Login. . . . . . . . . . . . . .137
Notes, Cautions, and Warnings About Using HP-UX Integrated
Login with DCE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .137
DCE and Anonymous FTP. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .138
AFS and Kerberos Authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . .140
7. Notes on Cell Administration