Installing, Configuring and Administering the Kerberos Server V 2.0 on HP-UX 11i

Installation
Before Installing The Kerberos Server
Chapter 2 35
Before Installing The Kerberos Server
Before you install the Server, it is recommended that you:
Ensure that the Kerberos Server is installed on a system that is
physically secure and has restricted access to it. If necessary,
ascertain that the system, on which you install the Server, is kept
under lock and key.
Disable all the network services, such as ftp, telnet, rlogin,
finger et all, by restricting access to the machine. You can do this,
by changing the /etc/inetd.conf file to deactivate the
non-kerberized services. The inetd daemon must be restarted after
these changes have been made.
Also, ensure that the file system is protected with proper permissions
in order to restrict the non-root users from accessing and
manipulating the Kerberos Server maintained files, such as cache
files, stash files et all.
Ensure that you have the HP-UX 11i installed on your system. You
can check the version of the HP-UX operating system by using the
uname -r command.
The following pages of this chapter describe the minimum software and
hardware requirements that you would need before you install the
Kerberos Server (T1417AA) software.