Using This Manual
The Installing, Configuring and Administering the Kerberos Server on
This manual is organized as follows:
•Chapter 1, Overview - Provides an introduction to the Kerberos Server, outlines the new features in this release and highlights the key advantages of using the Kerberos Server.
•Chapter 2, Installation - Describes the
•Chapter 3, Migration - Explains the migration process from
Kerberos Server V 1.0 to the latest version, Kerberos Server V 2.0.
•Chapter 4, Interoperability - Contains information specific to establishing interoperability with Windows 2000 Kerberos implementations.
•Chapter 5, Configuration - Provides information on the Configuration files of the Kerberos Server. These configuration files have been explained in detail with relevant examples and sample files. Also, the process for configuring your Primary Security Server and Secondary Security Servers, have been explained here.
•Chapter 6, Administration - Describes the procedures for administering the Kerberos Servers’ database. It also entails a discussion on Principals and their attributes.
•Chapter 7, Propagation - Describes the tools and procedures that enable propagation of the Kerberos Server’s database from the
Primary Security Sever to the Secondary Security Servers.
•Chapter 8,
21