Configuring the Kerberos Server With C-Tree Backend

Autoconfiguring the Kerberos Server

Step

5.

To remove the existing Kerberos server configuration, press y and press

 

 

n to retain the existing database.

Step

6.

Configure your Kerberos server as either a primary security server or a

 

 

secondary security server:

1.To configure your Kerberos server as a primary security server, select option 1.

2.To configure your Kerberos server as a secondary security server, select option 2. Before you log on to the Remote Administrator, stop the daemons that are already running on the secondary security server.

Step

7.

Specify the encryption type. If you do not specify a value, the default

 

 

value, DES-MD5, is selected.

Step

8.

To stash the principal database key file on your local disk, press y at the

 

 

prompt. Press n if you do not want to stash the principal database key

 

 

file.

Step

9.

Enter names for other servers:

If you had chosen to configure your primary security server, you are prompted for the names of your secondary security servers.

If you had chosen to configure your secondary security server, you are prompted for the name of your primary security server.

Step 10. Enter the realm name. The default value is displayed. To use the default, press Return; otherwise, enter your realm name.

Step 11. Enter the location where you want to store log messages. By default, log messages are stored in the syslog file. To change the default location, enter y and specify the absolute directory name for the log messages.

Step 12. Enter the database master password.

Step 13. Re-enter the database master password to verify the password.

Step 14. Your configuration is now complete and your Kerberos daemons are up and running. To return to the main menu, press Return.

72

Chapter 5