Managing network authentication service

After you have configured network authentication service, you can request tickets, work with key table files, and administer host name resolution. You can also work with credentials files and back up configuration files.

IBM i user tasks

The IBM® i platform can also operate as a client in a Kerberos-enabled network. Users can sign on to the system and perform Kerberos-related tasks through the Qshell Interpreter. The following tasks use several Qshell commands to perform common tasks for users.
Note: If you are using the 5250 emulator in IBM i Access Client Solutions, you need to change the Remote sign-on system value to enable you to bypass the sign-on. To change the Remote sign-on system value, follow these steps:
  1. In IBM Navigator for i, expand IBM i Management > Configuration and Service and select System Values.
  2. Right-click Signon and select Properties.
  3. On the Remote page, select Allow sign-on to be bypassed and Source and target user IDs must match, and click OK.

Network authentication service administration tasks

The following tasks that can be performed by an administrator in IBM Navigator for i. For more task-based information, see the IBM Navigator for i help for network authentication service.