Configuration Guide for Kerberos Client Products on HP-UX 11.0 | HP-UX 11i v1 | HP-UX 11i v1.6 | HP-UX 11i v2
Configuring the Kerberos Environment
Server Configuration Procedures
Chapter 3 79
NOTE The steps mentioned below are the identical for configuring both the
primary security server as well as the secondary security server.
b. You will be prompted to specify the encryption type. If you do not
specify this value, the default value, DES-MD5, will be selected.
c. You will be prompted to stashthe principal database key on your local
disk. Press “y” to stash the principal database key file or “n” if you do
not want to stash the principal database key file.
d. If you have selected 1, that is, selected to configure your primary
security server, you are now prompted for the names of your
secondary security servers.
e. If you have selected 2, that is, selected to configure your secondary
security server, you are now prompted for the name of your Primary
Security Server.
f. You will be prompted to enter the realm name. The default value is
displayed. If you choose to use the default then, press the return key,
else enter your realm name.
g. You will be prompted to enter the database master password.
h. You will be prompted to re-enter the database master password to
verify the password.
i. Your configuration is now complete and your Kerberos daemons are
up and running. To return to the main menu, press the return key.
Step 4. Select option 2 to start the Kerberos daemons. Press the return key to
return to the main menu.
Step 5. Select option 3 to stop the Kerberos daemons. Press the return key to
return to the main menu.
Step 6. Select option 4 to un-configure the Kerberos daemons. You will be
prompted with amessage to confirm this action. Press “y” to un-configure
the Kerberos Server and “n” to return to the main menu.
Step 7. Select option 5 to exit from the tool.
Step 8. Select option 6 to view the help contents.