Scenario: Propagating network authentication service and EIM across multiple systems

 

This scenario demonstrates how to use the Synchronize Functions wizard in iSeries™ Navigator to propagate a single signon configuration across multiple systems in a mixed OS/400® release environment. Administrators can save time by configuring single signon once and propagating that configuration to all of their systems, instead of configuring each system individually.

 

Situation

You are a network administrator for a large auto parts manufacturer. You manage five systems with iSeries Navigator. One system operates as the central system, which stores data and manages the endpoint systems. You have read about the benefits of single signon and you want to configure a single signon environment for your enterprise. You have just completed the process of setting up a test environment on one system and you want to extend your single signon environment throughout the enterprise. You have four other servers to configure and you want to find a way to configure them as efficiently as possible.

You know that iSeries Navigator provides the Synchronize Functions wizard that allows you to copy the single signon configuration from one system and apply it to other i5/OS® V5R3 or later systems. This eliminates the need to configure each system separately.

However, one of your systems runs OS/400® Version 5 Release 2 (V5R2). OS/400 V5R2 does not support the Synchronize Functions wizard, which means that separately configure this system to match the current network authentication service and EIM configurations on your model system.

This scenario has the following advantages:

 

Objectives

As the network administrator for MyCo, Inc., you want to create a single signon environment for your enterprise in which all your servers will participate and you want to configure your servers as quickly and easily as possible.

The objectives of this scenario are as follows:

 

Details

The following figure illustrates the network environment for this scenario.

The figure illustrates the following points relevant to this scenario.

Windows 2000 server

  • Acts as the Kerberos server, also known as the key distribution center (KDC), for the network.

  • All users are registered with the Kerberos server on the Windows 2000 server.

System MC1 - Central system

  • Runs on i5/OS Version 5 Release 4 (V5R3) or later with the following options and licensed products installed:

    • i5/OS Host Servers (5722-SS1 Option 12)

    • iSeries Access for Windows (5722-XE1)

  • Stores, schedules, and runs synchronize functions tasks for each of the endpoint systems.

  • Is configured for network authentication service and EIM.

System A - Model system

The model system should be configured similarly to the system identified as System A in the Scenario: Creating a single signon test environment scenario. Refer to this scenario to ensure that all of the single signon configuration tasks on the model system are completed and verified.

  • Runs i5/OS Version 5 Release 4 (V5R4) with the following options and licensed products installed:

    • i5/OS Host Servers (5722-SS1 Option 12)

    • iSeries Access for Windows (5722-XE1)

  • Is configured for network authentication service and EIM.

  • Is the model system from which the network authentication service and EIM configurations are propagated to the target systems.

System B

  • Runs i5/OS Version 5 Release 4 (V5R4) with the following options and licensed products installed:

    • i5/OS Host Servers (5722-SS1 Option 12)

    • iSeries Access for Windows (5722-XE1)

  • Is one of the target systems for the propagation of network authentication service and EIM configurations.

System C

  • Runs i5/OS Version 5 Release 4 (V5R4) with the following options and licensed products installed:

    • i5/OS Host Servers (5722-SS1 Option 12)

    • iSeries Access for Windows (5722-XE1)

  • Is one of the target systems for the propagation of network authentication service and EIM configurations.

System D

  • Runs OS/400 Version 5 Release 2 (V5R2) with the following options and licensed products installed:

    • OS/400 Host Servers (5722-SS1 Option 12)

    • iSeries Access for Windows (5722-XE1)

    • Cryptographic Access Provider (5722-AC3)

  • Has the following V5R2 PTFs (program temporary fixes) applied:

    • SI08977

    • SI08979

  • Requires separate, manual configuration of network authentication service and EIM using the appropriate wizards in iSeries Navigator.

Administrator's PC

  • Runs i5/OS V5R4 iSeries Access for Windows (5722-XE1).

  • Runs i5/OS V5R4 iSeries Navigator with the following subcomponents:

    Only required for PC used to administer network authentication service.

    • Network

    • Security

 

Prerequisites and assumptions

Successful implementation of this scenario requires that the following assumptions and prerequisites are met:

System MC1 - Central system prerequisites

  1. All system requirements, including software and operating system installation, have been verified.

    To verify that these licensed programs have been installed, complete the following:

    1. In iSeries Navigator, expand your system > Configuration and Service > Software > Installed Products.

    2. Ensure that all the necessary licensed programs are installed.

  2. All necessary hardware planning and setup is complete.

  3. TCP/IP and basic system security are configured and tested.

  4. Secure Sockets Layer (SSL) has been configured to protect the transmission of data between these servers.

    When you propagate network configuration service configuration among servers, sensitive information like passwords are sent across the network. You should use SSL to protect this information, especially if it is being sent outside your Local Area Network (LAN). See Scenario: Secure all connections to your Management Central server with SSL for details.

System A - Model system prerequisites

This scenario assumes that System A is properly configured for single signon. Refer to the Scenario: Creating a single signon test environment scenario to ensure that all of the single signon configuration tasks on the model system are completed and verified.

  1. All system requirements, including software and operating system installation, have been verified.

    To verify that these licensed programs have been installed, complete the following:

    1. In iSeries Navigator, expand your system > Configuration and Service > Software > Installed Products.

    2. Ensure that all the necessary licensed programs are installed.

  2. All necessary hardware planning and setup is complete.

  3. TCP/IP and basic system security are configured and tested.

  4. Secure Sockets Layer (SSL) has been configured to protect the transmission of data between these servers.

    When you propagate network configuration service configuration among servers, sensitive information like passwords are sent across the network. You should use SSL to protect this information, especially if it is being sent outside your Local Area Network (LAN). See Scenario: Secure all connections to your Management Central server with SSL for details.

System B, System C, and System D - Endpoint systems prerequisites

  1. All system requirements, including software and operating system installation, have been verified.

    To verify that these licensed programs have been installed, complete the following:

    1. In iSeries Navigator, expand your system > Configuration and Service > Software > Installed Products.

    2. Ensure that all the necessary licensed programs are installed.

  2. All necessary hardware planning and setup is complete.

  3. TCP/IP and basic system security are configured and tested.

  4. Secure Sockets Layer (SSL) has been configured to protect the transmission of data between these servers.

    When you propagate network configuration service configuration among servers, sensitive information like passwords are sent across the network. You should use SSL to protect this information, especially if it is being sent outside your Local Area Network (LAN). See Scenario: Secure all connections to your Management Central server with SSL for details.

Windows 2000 server prerequisites

  1. All necessary hardware planning and setup have been completed.

  2. TCP/IP has been configured and tested on the server.

  3. Windows 2000 domain has been configured and tested.

  4. All users within your network have been added to the Kerberos server.

 

Configuration steps

To propagate the network authentication service and EIM configurations from the model system, System A to the endpoint systems, System B and System C, complete the following tasks:

You need to understand the concepts related to single signon, which include network authentication service and Enterprise Identity Mapping (EIM) concepts, before you implement this scenario. See the following information to learn about the terms and concepts related to single signon:

 

Parent topic:

Single signon scenarios