Configuration
Auto-Configuration of the Security Server
1)Configure the server
2)Start the Kerberos daemons
3)Stop the Kerberos daemons
4)
5)Exit
6)Help
Step 3. Select option 1 to configure the server.
a.You will be prompted to opt between Configuring your Kerberos Server as either a Primary Security Server or a Secondary Security Server.
1.Select option 1 to configure your Kerberos Server as a primary security server
2.Select option 2 to configure your Kerberos Server as a secondary security server. Before you logon to the Remote Administrator, stop the daemons that are already running on the Secondary Server.
NOTE | The steps mentioned below are the identical for configuring both the |
| primary security server as well as the secondary security server. |
|
|
b.You will be prompted to specify the encryption type. If you do not specify this value, the default value,
c.You will be prompted to stash the principal database key on your local disk. Press “y” to stash the principal database key file or “n” if you do not want to stash the principal database key file.
d.If you have selected 1, that is, selected to configure your primary security server, you are now prompted for the names of your secondary security servers.
e.If you have selected 2, that is, selected to configure your secondary security server, you are now prompted for the name of your Primary Security Server.
f.You will be prompted to enter the realm name. The default value is displayed. If you choose to use the default then, press the return key, else enter your realm name.
g.You will be prompted to enter the database master password.
Chapter 5 | 65 |