JavaScript is required to for searching.
Skip Navigation Links
Exit Print View
Oracle Solaris Cluster Data Service for Kerberos Guide
search filter icon
search icon

Document Information

Preface

1.  Installing and Configuring Oracle Solaris Cluster for Kerberos

Oracle Solaris Cluster HA for Kerberos

Installing and Configuring Oracle Solaris Cluster HA for Kerberos

Configuring Oracle Solaris Cluster HA for Kerberos in Non-Global Zones

How to Configure Oracle Solaris Cluster HA for Kerberos in Non-Global Zones

Installing Kerberos

How to Install Kerberos

Installing the Oracle Solaris Cluster HA for Kerberos Packages

How to Install the Oracle Solaris Cluster HA for Kerberos Packages

Registering and Configuring Oracle Solaris Cluster HA for Kerberos

How to Register and Configure Oracle Solaris Cluster HA for Kerberos

How to Configure the HAStoragePlus Resource Type

Tuning the Oracle Solaris Cluster HA for Kerberos Fault Monitor

Operations by the Fault Monitor During a Probe

Verifying Oracle Solaris Cluster HA for Kerberos Installation and Configuration

How to Verify Oracle Solaris Cluster HA for Kerberos Installation and Configuration

A.  Oracle Solaris Cluster HA for Kerberos Extension

Index

Verifying Oracle Solaris Cluster HA for Kerberos Installation and Configuration

Verify that you have correctly installed and configured Oracle Solaris Cluster HA for Kerberos.

How to Verify Oracle Solaris Cluster HA for Kerberos Installation and Configuration

  1. Configure a Kerberos client to authenticate the newly created server as described in Configuring Kerberos Clients in System Administration Guide: Security Services.

    When referencing the server in the client's configuration file, /etc/krb5/krb5.conf, specify the logical hostname of the server. An example of this name could be kdc-1.example.com.

  2. After the client is configured, test the authentication of a user principal by using kinit(1).
    # kinit user_name
    Password for user_name@realm_name:
    user_name

    A user principal that you created previously

    realm_name

    Indicates the realm name that was previously configured in the Kerberos environment.

    You return to the shell prompt without any error message being output to the terminal.

  3. Test the Kerberos administration service.
    # kadmin -p administrative_principal_name
    Authenticating as principal administrative_principal_name@realm_name with password.
        Password for administrative_principal_name@realm_name: 
        kadmin:  quit
    administrative_principal_name

    An administrative principal that you had previously created.

    realm_name

    Indicates the realm name that was previously configured in the Kerberos environment.

    You return to the shell prompt without any error message being output to the terminal.