Scenario: Configuring network authentication service

 

Here are the prerequisites and objectives of adding network authentication service to your network.

 

Situation

You are a network administrator that manages the network for the order receiving department in your company. You recently added a System i™ product to your network to contain several applications for your department. In your network, you manage users with Microsoft® Windows® Active Directory on a Microsoft Windows 2000 server. Currently all of your users have workstations that run Microsoft Windows 2000 operating system. You have your own Kerberos-enabled applications that use Generic Security Services (GSS) APIs.

This scenario has the following advantages:

 

Objectives

In this scenario, MyCo, Inc. wants to add a System i product to an existing realm where a Windows 2000 server acts as the Kerberos server. The System i platform contains several business critical applications that need to be accessed by the correct users. Users need to be authenticated by the Kerberos server to gain access to these applications.

The objectives of this scenario are as follows:

 

Details

The following figure illustrates the network characteristics of MyCo.

System A

Windows 2000 server

Client PCs

 

Prerequisites and assumptions

  1. All system requirements, including software and operating system installation, have been verified.

    To verify that the required licensed programs have been installed, follow these steps:

    1. In iSeries Navigator, expand your system > Configuration and Service > Software > Installed Products.

    2. Ensure that all the necessary licensed programs are installed.

  2. All necessary hardware planning and setup have been completed.

  3. TCP/IP and basic system security have been configured and tested on each of these servers.

  4. A single DNS server is used for host name resolution for the network. Host tables are not used for host name resolution.

    The use of host tables with Kerberos authentication might result in name resolution errors or other problems. For more detailed information about how host name resolution works with Kerberos authentication, see Host name resolution considerations.

 

Configuration steps

To configure network authentication service on your system, complete these steps.

 

Parent topic:

Scenarios: Using network authentication service in a Kerberos network