78 lines
5.8 KiB
HTML
78 lines
5.8 KiB
HTML
<?xml version="1.0" encoding="UTF-8"?>
|
||
<!DOCTYPE html
|
||
PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
|
||
<html lang="en-us" xml:lang="en-us">
|
||
<head>
|
||
<meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
|
||
<meta name="security" content="public" />
|
||
<meta name="Robots" content="index,follow" />
|
||
<meta http-equiv="PICS-Label" content='(PICS-1.1 "http://www.icra.org/ratingsv02.html" l gen true r (cz 1 lz 1 nz 1 oz 1 vz 1) "http://www.rsac.org/ratingsv01.html" l gen true r (n 0 s 0 v 0 l 0) "http://www.classify.org/safesurf/" l gen true r (SS~~000 1))' />
|
||
<meta name="DC.Type" content="task" />
|
||
<meta name="DC.Title" content="Test network authentication service on iSeries A and iSeries B" />
|
||
<meta name="DC.Relation" scheme="URI" content="rzamzenablessoos400.htm" />
|
||
<meta name="DC.Relation" scheme="URI" content="rzamzcreatehomedirectoriesoniseriesaandiseriesb.htm" />
|
||
<meta name="DC.Relation" scheme="URI" content="rzamzcreateeimidentifiersfortwoadministratorsjohndayandsharonjones.htm" />
|
||
<meta name="copyright" content="(C) Copyright IBM Corporation 2000, 2006" />
|
||
<meta name="DC.Rights.Owner" content="(C) Copyright IBM Corporation 2000, 2006" />
|
||
<meta name="DC.Format" content="XHTML" />
|
||
<meta name="DC.Identifier" content="rzamztestnetworkauthenticationserviceoniseriesaandiseriesb" />
|
||
<meta name="DC.Language" content="en-us" />
|
||
<!-- All rights reserved. Licensed Materials Property of IBM -->
|
||
<!-- US Government Users Restricted Rights -->
|
||
<!-- Use, duplication or disclosure restricted by -->
|
||
<!-- GSA ADP Schedule Contract with IBM Corp. -->
|
||
<link rel="stylesheet" type="text/css" href="./ibmdita.css" />
|
||
<link rel="stylesheet" type="text/css" href="./ic.css" />
|
||
<title>Test network authentication service on iSeries A and iSeries B</title>
|
||
</head>
|
||
<body id="rzamztestnetworkauthenticationserviceoniseriesaandiseriesb"><a name="rzamztestnetworkauthenticationserviceoniseriesaandiseriesb"><!-- --></a>
|
||
<!-- Java sync-link --><script language="Javascript" src="../rzahg/synch.js" type="text/javascript"></script>
|
||
<h1 class="topictitle1">Test network authentication service on iSeries A and iSeries B</h1>
|
||
<div><div class="section"><div class="p">After you complete the network authentication service configuration
|
||
tasks for both of your systems, you need to verify that your configurations
|
||
work correctly for both <span class="keyword">iSeries™</span> A
|
||
and <span class="keyword">iSeries</span> B. You can do this
|
||
testing by completing these steps to request a ticket granting ticket for
|
||
the <span class="keyword">iSeries</span> A and <span class="keyword">iSeries</span> B principals:<div class="note"><span class="notetitle">Note:</span> Ensure that
|
||
you have created a home directory for your <span class="keyword">iSeries</span> user
|
||
profile before performing this procedure.</div>
|
||
</div>
|
||
</div>
|
||
<ol><li class="stepexpand"><span>On a command line, enter <tt>QSH</tt> to start the Qshell Interpreter.</span></li>
|
||
<li class="stepexpand"><span>Enter <tt>keytab list</tt> to display a list of principals registered
|
||
in the keytab file. In this scenario, krbsvr400/iseriesa.myco.com@MYCO.COM
|
||
should display as the principal name for <span class="keyword">iSeries</span> A.</span></li>
|
||
<li class="stepexpand"><span>Enter <tt>kinit -k krbsvr400/iseriesa.myco.com@MYCO.COM</tt> to
|
||
request a ticket-granting ticket from the Kerberos server. By running this
|
||
command, you can verify that your <span class="keyword">iSeries</span> system
|
||
has been configured properly and that the password in the keytab file matches
|
||
the password stored on the Kerberos server. If this is successful then the
|
||
kinit command will display without errors.</span></li>
|
||
<li class="stepexpand"><span>Enter <tt>klist</tt> to verify that the default principal is krbsvr400/iseriesa.myco.com@MYCO.COM.
|
||
This command displays the contents of a Kerberos credentials cache and verifies
|
||
that a valid ticket has been created for the <span class="keyword">iSeries</span> service
|
||
principal and placed within the credentials cache on the <span class="keyword">iSeries</span> system.</span> <pre class="screen"> Ticket cache: FILE:/QIBM/USERDATA/OS400/NETWORKAUTHENTICATION/creds/krbcred
|
||
|
||
Default principal: krbsvr400/iseriesa.myco.com@MYCO.COM
|
||
|
||
Server: krbtgt/MYCO.COM@MYCO.COM
|
||
Valid 200X/06/09-12:08:45 to 20XX/11/05-03:08:45
|
||
$ </pre>
|
||
</li>
|
||
</ol>
|
||
<div class="section"><p> Repeat these steps using the service principal name for <span class="keyword">iSeries</span> B: krbsvr400/iseriesb.myco.com@MYCO.COM</p>
|
||
<p>Now
|
||
that you have tested network authentication service on <span class="keyword">iSeries</span> A
|
||
and <span class="keyword">iSeries</span> B, you can create
|
||
an EIM identifier for each of the administrators.</p>
|
||
</div>
|
||
</div>
|
||
<div>
|
||
<div class="familylinks">
|
||
<div class="parentlink"><strong>Parent topic:</strong> <a href="rzamzenablessoos400.htm" title="View this scenario to learn how to configure network authentication service and EIM to create a single signon environment across multiple systems in an enterprise. This scenario expands on the concepts and tasks presented in the previous scenario which demonstrates how to create a simple single signon test environment.">Scenario: Enable single signon for i5/OS</a></div>
|
||
<div class="previouslink"><strong>Previous topic:</strong> <a href="rzamzcreatehomedirectoriesoniseriesaandiseriesb.htm">Create home directories on iSeries A and iSeries B</a></div>
|
||
<div class="nextlink"><strong>Next topic:</strong> <a href="rzamzcreateeimidentifiersfortwoadministratorsjohndayandsharonjones.htm">Create EIM identifiers for two administrators, John Day and Sharon Jones</a></div>
|
||
</div>
|
||
</div>
|
||
</body>
|
||
</html> |