Scenario: Configure network authentication service

Use the following scenario to become familiar with the prerequisites and objectives of adding network authentication service to your network.

Situation

You are a network administrator that manages the network for the order receiving department in your company. You recently added an iSeries™ to your network to house several necessary applications for your department. In your network you manage users with Microsoft® Windows® Active Directory on a Microsoft Windows 2000 server. Currently all of your users have workstations that run Microsoft Windows 2000 operating system. You have your own Kerberos-enabled applications that use Generic Security Services (GSS) APIs.

This scenario has the following advantages:

Objectives

In this scenario, MyCo, Inc. wants to add an iSeries system to an existing realm where a Windows 2000 server acts as the Kerberos server. The iSeries contains several business critical applications that need to be accessed by the correct users. Users need to be authenticated by the Kerberos server to gain access to these applications.

The objectives of this scenario are as follows:

Details

The following figure illustrates the network characteristics of MyCo.


 Diagram of network for Network authentication service configuration

iSeries A

Windows 2000 server

Client PCs

Note: Start of changeThe KDC server name, kdc1.myco.com, and the hostname, iseriesa.myco.com are fictitious names used in this scenario.End of change

Prerequisites and assumptions

  1. All system requirements, including software and operating system installation, have been verified.
    To verify that the required licensed products have been installed, complete the following:
    1. In iSeries Navigator, expand your iSeries server > Configuration and Service > Software > Installed Products.
    2. Ensure that all the necessary licensed products are installed.
  2. All necessary hardware planning and setup have been completed.
  3. TCP/IP and basic system security have been configured and tested on each of these servers.
  4. A single DNS server is used for host name resolution for the network. Host tables are not used for host name resolution.
    Note: The use of host tables with Kerberos authentication may result in name resolution errors or other problems. For more detailed information about how host name resolution works with Kerberos authentication, see Host name resolution considerations.

Configuration steps

To configure network authentication service on your system, complete these steps.