HP (Hewlett-Packard) E0905 Server User Manual


 
Configuring the Kerberos Server With C-Tree Backend
Autoconfiguring the Kerberos Server
Chapter 572
Step 5. To remove the existing Kerberos server configuration, press y and press
n to retain the existing database.
Step 6. Configure your Kerberos server as either a primary security server or a
secondary security server:
1. To configure your Kerberos server as a primary security server, select
option 1.
2. To configure your Kerberos server as a secondary security server,
select option 2. Before you log on to the Remote Administrator, stop
the daemons that are already running on the secondary security
server.
Step 7. Specify the encryption type. If you do not specify a value, the default
value, DES-MD5, is selected.
Step 8. To stash the principal database key file on your local disk, press y at the
prompt. Press n if you do not want to stash the principal database key
file.
Step 9. Enter names for other servers:
If you had chosen to configure your primary security server, you are
prompted for the names of your secondary security servers.
If you had chosen to configure your secondary security server, you are
prompted for the name of your primary security server.
Step 10. Enter the realm name. The default value is displayed. To use the default,
press Return; otherwise, enter your realm name.
Step 11. Enter the location where you want to store log messages. By default, log
messages are stored in the syslog file. To change the default location,
enter y and specify the absolute directory name for the log messages.
Step 12. Enter the database master password.
Step 13. Re-enter the database master password to verify the password.
Step 14. Your configuration is now complete and your Kerberos daemons are up
and running. To return to the main menu, press Return.