|
|
|
|
|
| Propagating the Kerberos Server | |
|
|
|
|
|
|
| Setting Up Propagation |
|
|
|
| Table | |||
|
|
|
| avoid confusion and redundancy in this section regarding names, | |||
|
|
|
| Table | |||
|
|
|
| discuss the daemon. |
|
|
|
Table |
|
|
| primary security server Services and Daemons | |||
|
|
|
|
|
|
|
|
|
|
|
| Daemon Name | Function |
| Generic Usage |
|
|
|
|
| Name | ||
|
|
|
|
|
|
| |
|
|
|
|
|
|
|
|
|
|
|
| kadmind | Accepts administration |
| Admin |
|
|
|
|
| requests from the |
|
|
|
|
|
|
| administrator and |
|
|
|
|
|
|
| database propagation |
|
|
|
|
|
|
| requests from the |
|
|
|
|
|
|
| propagation daemon, |
|
|
|
|
|
|
| kpropd. |
|
|
|
|
|
|
|
|
|
|
|
|
|
| kdcd | Accepts authentication |
| KDC |
|
|
|
|
| requests from client |
|
|
|
|
|
|
| applications |
|
|
|
|
|
|
|
|
|
|
|
|
|
| kpropd | Initiates the principal |
| Prop |
|
|
|
|
| database propagation |
|
|
|
|
|
|
| process |
|
|
|
|
|
|
|
|
| |
|
|
|
| To propagate the principal database entries on the primary security | |||
|
|
|
| server to secondary security servers, complete the following steps: | |||
|
|
|
|
|
|
| |
NOTE |
|
|
| Some steps are specific to the primary security server or to the secondary | |||
|
|
|
| security server. Ensure that you perform the task on the appropriate | |||
|
|
|
| server. |
|
|
|
|
|
|
|
|
| ||
Step | 1. Create the propagation configuration data using the following steps: |
1.Log on to the primary security server as root.
2.On the primary security server, verify that the correct information is added to the krb.conf file to locate all secondary security servers and to identify the correct default realm of the primary security server.
Chapter 9 | 259 |