Use these scenarios to learn about network authentication service.
The following scenarios provide descriptions of common environments where network authentication service can be used to allow i5/OS™ to participate in a Kerberos network. Review the following scenarios to become familiar with the technical and configuration details involved with configuring network authentication service.