Using This Manual

The Installing, Configuring and Administering the Kerberos Server on HP-UX 11i manual describes how this product can provide the infrastructure for your security needs. Use this guide as a road map to find information that you need to configure and maintain the Kerberos Server.

This manual is organized as follows:

Chapter 1, Overview - Provides an introduction to the Kerberos Server, outlines the new features in this release and highlights the key advantages of using the Kerberos Server.

Chapter 2, Installation - Describes the pre-requisites and the procedure for installing the Kerberos Server.

Chapter 3, Migration - Explains the migration process from

Kerberos Server V 1.0 to the latest version, Kerberos Server V 2.0.

Chapter 4, Interoperability - Contains information specific to establishing interoperability with Windows 2000 Kerberos implementations.

Chapter 5, Configuration - Provides information on the Configuration files of the Kerberos Server. These configuration files have been explained in detail with relevant examples and sample files. Also, the process for configuring your Primary Security Server and Secondary Security Servers, have been explained here.

Chapter 6, Administration - Describes the procedures for administering the Kerberos Servers’ database. It also entails a discussion on Principals and their attributes.

Chapter 7, Propagation - Describes the tools and procedures that enable propagation of the Kerberos Server’s database from the

Primary Security Sever to the Secondary Security Servers.

Chapter 8, Inter-realm- Explains inter-realm authentication and interoperability trust. Also, a brief on the additional server configuration requirements in deployments that use multiple realms and inter-realm authentication.

21