7

Configuring the Primary and

 

Secondary Security Server

This chapter describes the procedure to configure the primary and secondary security server.

Chapter 7

95

Page 95
Image 95
HP UX Kerberos Data Security Software manual Configuring the Primary