Repeating steps 4 through 6 for target systems

After allowing trusted connections for the central system, you must repeat steps 4 through 6 in this scenario to apply these changes to the target systems in the MyCo2 system group. This ensures that the target systems are configured to allow trusted connections.

Refer to these steps:
  1. Step 4: Collecting system values inventory
  2. Step 5: Comparing and updating Kerberos settings in System i® Navigator
  3. Step 6: Restarting Management Central server on the central system and target systems