Configuration Guide for Kerberos Client Products on HP-UX 11.0 | HP-UX 11i v1 | HP-UX 11i v1.6 | HP-UX 11i v2

Configuring the Kerberos Environment
Server Configuration Procedures
Chapter 378
enables you with the option of creating a stash file
allows you to specify the encryption type
The other sections in the configuration files will be set to it’s default
values. If you want to customize these sections, you will have to
manually edit the configuration files and restart the kdcd and kadmind
daemons using this tool. This tool also allows you to customize the
encryption type and stash file.
NOTE It is strongly recommend that you use this tool to configure your basic
Kerberos Server.
Given below is a step-wise procedure to auto-configure your Kerberos
server:
Step 1. Run the utility, /opt/krb5/sbin/krbsetup
Step 2. Select one of the following options:
1) Configure the server
2) Start the Kerberos daemons
3) Stop the Kerberos daemons
4) Un-configure the Server
5) Exit
6) Help
Step 3. Select option 1 to configure the server.
a. You will be prompted to opt between Configuring your Kerberos
Server as either a Primary Security Server or a Secondary Security
Server.
1. Select option 1 to configure your Kerberos Server as a primary
security server
2. Select option 2 to configure your Kerberos Server as a secondary
security server. Before you logon to the Remote Administrator,
stop the daemons that are already running on the Secondary
Server.