Principals are names of users or services in a Kerberos network. Principal names consist of the user name or service name and the name of the realm to which that user or service belongs.
If Mary Jones uses the realm MYCO.COM, her principal name might be jonesm@MYCO.COM. Mary Jones uses this principal name and its associated password to be authenticated by a centralized Kerberos server. All principals are added to the Kerberos server, which maintains a database of all users and services within a realm.
When developing a system for naming principals, you should assign principal names using a consistent naming convention that will accommodate current and future users. Use the following suggestions to establish a naming convention for your principals:
When you configure network authentication service on System i™ platforms, the principal names can be optionally created. Each of these principals represents services located on the i5/OS® operating system. During the configuration of network authentication service, a key table entry is created on the system for each of the service principals that you choose to create. This key table entry stores the service principal name and the encrypted password that you specified during configuration. It is important to note that all i5/OS service principals need to be added to the Kerberos server after network authentication service is configured. The methods of adding the i5/OS principal to the Kerberos server varies based on the Kerberos server that you have configured in your enterprise. For instructions on how to add the i5/OS principal name to either a Windows® 2000 domain or a Kerberos server in i5/OS PASE, see Adding i5/OS principals to the Kerberos server. The following information describes each of the i5/OS service principals that are created during network authentication service configuration:
The service principal is used for several i5/OS interfaces, such as QFileSrv.400, Telnet, Distributed Relational Database Architecture™ (DRDA®), iSeries™ NetServer™, and IBM® eServer™ iSeries Access for Windows including iSeries Navigator. Each of these applications might require additional configuration to enable Kerberos authentication.
In past releases, the Network Authentication Service wizard created an uppercase keytab entry for LDAP service. If you have configured the LDAP principal previously, when you reconfigure network authentication service or access the wizard through the Enterprise Identity Mapping (EIM) interface, you will be prompted to change this principal name to its lowercase version.
If you plan on using Kerberos authentication with the directory server, you not only need to configure network authentication service, but also change properties for the directory server to accept Kerberos authentication. When Kerberos authentication is used, directory server associates the server distinguished name (DN) with the Kerberos principal name. You can choose to have the server DN associated by using one of the following methods:
See IBM Directory Server for iSeries (LDAP) for details on the configuration Kerberos authentication for the directory server.
See the HTTP Server for i5/OS: documentation home page to find information about using Kerberos authentication with HTTP Server.
Client connection | iSeries NetServer principal name |
---|---|
Windows XP |
cifs/System i fully qualified domain name
|
Windows 2000 |
HOST/System i fully qualified domain name
|
See iSeries NetServer for more information about using Kerberos authentication with this application.
Example planning work sheet
Questions | Answers |
---|---|
What is the naming convention that you plan to use for Kerberos principals that represent users in your network? |
First initial followed by first five letters of the family name in lowercase, for example, mjones |
What is the naming convention for applications on your network? |
Descriptive name followed by number, for example, database123 |
For which i5/OS services do you plan to use Kerberos authentication? | i5/OS Kerberos authentication will be used for the following services:
|
What are the i5/OS principal names for each of these i5/OS services? |
|