ibm-information-center/dist/eclipse/plugins/i5OS.ic.rzakh_5.4.0.1/rzakhkerberosscenario_verifykerberosprincipal.htm

58 lines
4.4 KiB
HTML

<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE html
PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html lang="en-us" xml:lang="en-us">
<head>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
<meta name="security" content="public" />
<meta name="Robots" content="index,follow" />
<meta http-equiv="PICS-Label" content='(PICS-1.1 "http://www.icra.org/ratingsv02.html" l gen true r (cz 1 lz 1 nz 1 oz 1 vz 1) "http://www.rsac.org/ratingsv01.html" l gen true r (n 0 s 0 v 0 l 0) "http://www.classify.org/safesurf/" l gen true r (SS~~000 1))' />
<meta name="DC.Type" content="task" />
<meta name="DC.Title" content="Verify the Kerberos principals are added to the trusted group file" />
<meta name="DC.Relation" scheme="URI" content="rzakhscenmc2.htm" />
<meta name="DC.Relation" scheme="URI" content="rzakhkerberosscenario_addkerberosserviceprincipal.htm" />
<meta name="DC.Relation" scheme="URI" content="rzakhkerberosscenario_allowtrustedconnections.htm" />
<meta name="copyright" content="(C) Copyright IBM Corporation 1998, 2006" />
<meta name="DC.Rights.Owner" content="(C) Copyright IBM Corporation 1998, 2006" />
<meta name="DC.Format" content="XHTML" />
<meta name="DC.Identifier" content="rzakhkerberosscenario_verifykerberosprincipal" />
<meta name="DC.Language" content="en-us" />
<!-- All rights reserved. Licensed Materials Property of IBM -->
<!-- US Government Users Restricted Rights -->
<!-- Use, duplication or disclosure restricted by -->
<!-- GSA ADP Schedule Contract with IBM Corp. -->
<link rel="stylesheet" type="text/css" href="./ibmdita.css" />
<link rel="stylesheet" type="text/css" href="./ic.css" />
<title>Verify the Kerberos principals are added to the trusted group file</title>
</head>
<body id="rzakhkerberosscenario_verifykerberosprincipal"><a name="rzakhkerberosscenario_verifykerberosprincipal"><!-- --></a>
<!-- Java sync-link --><script language="Javascript" src="../rzahg/synch.js" type="text/javascript"></script>
<h1 class="topictitle1">Verify the Kerberos principals are added to the trusted group file</h1>
<div><div class="section">After running the remote command, you can verify that the central
system's Kerberos service principal is in the trusted group file on each of
the target systems.</div>
<ol><li><span>In iSeries™ Navigator,
expand <span class="menucascade"><span class="uicontrol">iSeries B</span> &gt; <span class="uicontrol">File Systems</span> &gt; <span class="uicontrol">Integrated File System</span> &gt; <span class="uicontrol">Root</span> &gt; <span class="uicontrol">QIBM</span> &gt; <span class="uicontrol">UserData</span> &gt; <span class="uicontrol">OS400</span> &gt; <span class="uicontrol">MGTC</span> &gt; <span class="uicontrol">config</span></span>.</span></li>
<li><span>Right-click <span class="uicontrol">McTrustedGroup.conf</span> and select <span class="uicontrol">Edit</span> to
view the contents of the file.</span><ol type="a"><li><span>Right-click <span class="uicontrol">Integrated File System</span> and
select <span class="uicontrol">Properties</span>.</span></li>
<li><span>On the <span class="uicontrol">Integrated File System Properties</span> dialog
box, select <span class="uicontrol">All files</span> for <span class="uicontrol">Enable edit options
for:</span>, and click <span class="uicontrol">OK</span>.</span></li>
</ol>
</li>
<li><span>Verify that the central system's Kerberos service principal is
listed as one of the Management Central Trusted Group Members.</span></li>
<li><span>Repeat these steps for iSeries C and iSeries D to verify that the central
system's Kerberos service principal is added to each of the target systems.</span></li>
</ol>
</div>
<div>
<div class="familylinks">
<div class="parentlink"><strong>Parent topic:</strong> <a href="rzakhscenmc2.htm" title="Use the following scenario to become familiar with the prerequisites and objectives for using Kerberos authentication between Management Central servers.">Scenario: Use Kerberos authentication between Management Central servers</a></div>
<div class="previouslink"><strong>Previous topic:</strong> <a href="rzakhkerberosscenario_addkerberosserviceprincipal.htm">Add Kerberos service principal to the trusted group file for each endpoint</a></div>
<div class="nextlink"><strong>Next topic:</strong> <a href="rzakhkerberosscenario_allowtrustedconnections.htm">Allow trusted connections for the central system</a></div>
</div>
</div>
</body>
</html>