The following planning work sheets are tailored to fit this scenario based on the general single signon planning worksheets. These planning work sheets demonstrate the information that you need to gather and the decisions you need to make to prepare for this scenario. To ensure a successful implementation, be able to answer Yes to all prerequisite items in the work sheet and you should gather all the information necessary to complete the work sheets before you perform any configuration tasks.
Prerequisite work sheet | Answers | ||||
---|---|---|---|---|---|
Is your iSeries™ V5R3 (5722-SS1) or later for the following systems:
| Yes | ||||
Have you applied the latest program temporary fixes (PTFs)? | Yes | ||||
For System D, are you running i5/OS® V5R2 (5722-SS1) or later? | Yes | ||||
For System D, have you applied the latest program temporary fixes (PTFs), including the following:
| Yes | ||||
Are the following options and licensed products installed on all your System i™ models?
| Yes | ||||
Is i5/OS V5R3 or later iSeries (5722-XE1) installed on the administrator's PC? | Yes | ||||
Is i5/OS V5R3 or later iSeries Navigator installed on the administrator's PC?
| Yes | ||||
Have you installed the latest IBM iSeries Access for Windows® service pack? For the latest service pack see iSeries Access. | Yes | ||||
Do you have *SECADM, *ALLOBJ, and *IOSYSCFG special authorities? | Yes | ||||
Do you have one of the following systems acting as the Kerberos server? If yes, specify which system.
|
Planning work sheet for propagating the network authentication service and EIM configurations from System A to System B and System C | Answers | ||
---|---|---|---|
What is the name of the system group? | MyCo system group | ||
Which systems will be included in this system group? | System B, System C | ||
Which system is the model system? | System A | ||
Which functions do you plan to propagate to this system group? | Network authentication service and Enterprise Identity Mapping (EIM) | ||
Which type of keytab entries do you want to add to the keytab file for the target systems? | i5/OS Kerberos Authentication | ||
What are the passwords that are associated with each of the service principals for the model and target systems? Any and all passwords specified in this scenario are for example purposes only. To prevent a compromise to your system or network security, you should never use these passwords as part of your own configuration.
| Password for the principals for
Which user do you want to use to connect to the domain controller?
|
| User type: Distinguished name and password
|