Kerberos Server Version 3.12 Administrator's Guide

Configuring the Kerberos Server with LDAP
Autoconfiguring the Kerberos Server With LDAP Integration
Chapter 692
2. To configure your Kerberos server as a secondary security server,
select option 2. Before you log on to the Remote Administrator, stop
the daemons that are already running on the secondary security
server.
Step 18. Specify the encryption type. If you do not specify a value, the default
value, DES-MD5, is selected.
Step 19. To stash the principal database key file on your local disk, press y at the
prompt. Press n if you do not want to stash the principal database key
file.
Step 20. Enter names for other servers:
If you chose to configure your primary security server, you are
prompted for the names of your secondary security servers.
If you chose to configure your secondary security server, you are
prompted for the name of your primary security server.
Step 21. Enter the realm name. The default value is displayed. To use the default,
press Return; otherwise, enter your realm name.
Step 22. Enter the location where you want to store log messages. By default, log
messages are stored in the syslog file. To change the default location,
enter y and specify the absolute directory name where you want to store
the log messages.
Step 23. Enter the database master password.
Step 24. Re-enter the database master password to verify the password.
Step 25. Your configuration is now complete and your Kerberos daemons are up
and running. To return to the main menu, press Return.