Planning network authentication service
Before implementing network authentication service or a Kerberos solution on your network, it is essential to complete the necessary planning tasks.
To plan network authentication service and a Kerberos
implementation, you need to gather the appropriate information about
the systems and users on your network. Several planning work sheets
have been provided to help you to configure network authentication
service in your network.
Note: Many different Kerberos
authentication solutions exist and can be used in your enterprise.
This information focuses on planning an IBM i implementation and
considerations when you use network authentication service with a
Kerberos server configured in Microsoft Active
Directory or PASE for i.
The following IBM systems
support Kerberos authentication. For information about platform-specific
Kerberos implementation, see the following sources:
- System p
- IBM Network Authentication Service AIX®, Linux®, and Solaris Administrator's and User's Guide.
- IBM Network Authentication
Service AIX, Linux,
and Solaris Application Development Reference.Note: You can find this documentation in the AIX 5L Expansion Pack and Bonus Pack CD.
- System z®
Use these tasks to help you plan network authentication service.