Installing, Configuring and Administering the Kerberos Server V 2.0 on HP-UX 11i

Configuration
Auto-Configuration of the Security Server
Chapter 5 65
1) Configure the server
2) Start the Kerberos daemons
3) Stop the Kerberos daemons
4) Un-configure the Server
5) Exit
6) Help
Step 3. Select option 1 to configure the server.
a. You will be prompted to opt between Configuring your Kerberos
Server as either a Primary Security Server or a Secondary Security
Server.
1. Select option 1 to configure your Kerberos Server as a primary
security server
2. Select option 2 to configure your Kerberos Server as a secondary
security server. Before you logon to the Remote Administrator,
stop the daemons that are already running on the Secondary
Server.
NOTE The steps mentioned below are the identical for configuring both the
primary security server as well as the secondary security server.
b. You will be prompted to specify the encryption type. If you do not
specify this value, the default value, DES-MD5, will be selected.
c. You will be prompted to stash the principal database key on your local
disk. Press “y” to stash the principal database key file or “n” if you do
not want to stash the principal database key file.
d. If you have selected 1, that is, selected to configure your primary
security server, you are now prompted for the names of your
secondary security servers.
e. If you have selected 2, that is, selected to configure your secondary
security server, you are now prompted for the name of your Primary
Security Server.
f. You will be prompted to enter the realm name. The default value is
displayed. If you choose to use the default then, press the return key,
else enter your realm name.
g. You will be prompted to enter the database master password.