Installing, Configuring and Administering the Kerberos Server V 2.0 on HP-UX 11i

21
Using This Manual
The Installing, Configuring and Administering the Kerberos Server on
HP-UX 11i manual describes how this product can provide the
infrastructure for your security needs. Use this guide as a road map to
find information that you need to configure and maintain the Kerberos
Server.
This manual is organized as follows:
Chapter 1, Overview - Provides an introduction to the Kerberos
Server, outlines the new features in this release and highlights the
key advantages of using the Kerberos Server.
Chapter 2, Installation - Describes the pre-requisites and the
procedure for installing the Kerberos Server.
Chapter 3, Migration - Explains the migration process from
Kerberos Server V 1.0 to the latest version, Kerberos Server V
2.0.
Chapter 4, Interoperability - Contains information specific to
establishing interoperability with Windows 2000 Kerberos
implementations.
Chapter 5, Configuration - Provides information on the
Configuration files of the Kerberos Server. Theseconfiguration files
have been explained in detail with relevant examples and sample
files. Also, the process for configuring your Primary Security
Server and Secondary Security Servers, have been explained
here.
Chapter 6, Administration - Describes the procedures for
administering the Kerberos Servers’ database. It also entails a
discussion on Principals and their attributes.
Chapter 7, Propagation - Describes the tools and procedures that
enable propagation of the Kerberos Server’s database from the
Primary Security Sever to the Secondary Security Servers.
Chapter 8, Inter-realm - Explains inter-realm authentication and
interoperability trust. Also, a brief on the additional server
configuration requirements in deployments that use multiple realms
and inter-realm authentication.