The SunTM Enterprise Authentication Mechanism Guide describes how to install, administer, and use the Sun Enterprise Authentication Mechanism (SEAM) product. SEAM provides a complete implementation of Kerberos V5 for the Solaris 2.6 and Solaris 7 releases.
Most of this book is focused on the steps necessary to install, configure, and maintain the product. In addition, information for users about SEAM has been included, as well as a chapter describing the RPCSEC_GSS Application Programming Interface (API) implementation from a developer's viewpoint.
This book is designed for the following audiences:
System administrators and advanced users who need to install, configure, or administer a SEAM setup.
Anyone making use of the user-level commands provided by SEAM, such as SEAM versions of ftp or rcp. This information is primarily presented in Chapter 6, Using SEAM.
Network programmers interested in writing RPC-based applications that can take advantage of the RPCSEC-GSS security flavor. This information is primarily presented in Chapter 8, Secure Network Programming with RPCSEC_GSS.
The information for users requires only a basic knowledge of the Solaris operating environment. The information for administrators, chiefly that regarding installation, configuration, and administration of SEAM, requires a broad knowledge of the Solaris operating environment, including network administration topics. The developer's section requires knowledge of Remote Procedure Call (RPC) usage. The installation and maintenance section requires familiarity with standard Solaris installation procedures.
Chapter 1, Introduction to SEAM provides an overview of the SEAM product.
Chapter 2, Planning for SEAM describes the issues that need to be resolved before installing SEAM.
Chapter 3, Configuring SEAM presents the procedures for configuring Key Distribution Center (KDC) servers, SEAM network application servers, SEAM NFS servers, and SEAM clients.
Chapter 4, SEAM Error Messages and Troubleshooting explains the more important error messages produced by SEAM and offers solutions for common problems.
Chapter 5, Administering Principals and Policies includes information about setting up and administering principals, passwords, policies, and other information for each Kerberos realm database, and introduces the SEAM GUI-based tool that can be used for these tasks.
Chapter 6, Using SEAM provides user-level instructions for using SEAM, including: obtaining and using tickets, choosing a password, and using SEAM-based utilities such as ftp and rlogin.
Chapter 7, SEAM Reference describes all of the files that are included in the SEAM release. Also included is a detailed overview of the way the SEAM product works.
Chapter 8, Secure Network Programming with RPCSEC_GSS describes how to use the RPCSEC_GSS API to take advantage of the privacy and integrity security services for RPC-based programs.
This is a list of related documentation that is referred to in this book:
The SunDocsSM program provides more than 250 manuals from Sun MicrosystemsTM. If you live in the United States, Canada, Europe, or Japan, you can purchase documentation sets or individual manuals using this program.
For a list of documents and how to order them, see the catalog section of the SunExpressTM Internet site at http://www.sun.com/sunexpress. You can also order documentation online (see below).
The docs.sun.com Web site enables you to access Sun technical documentation online. You can browse the docs.sun.com archive or search for a specific book title or subject. The URL is http://docs.sun.com.
The following table shows the typographic conventions used in this manual.
Table P-1 Typographic Conventions
Typeface or Symbol |
Meaning |
Example |
---|---|---|
AaBbCc123 | The names of commands, files, and directories; on-screen computer output |
Edit your .login file. Use ls -a to list all files. machine_name% you have mail. |
AaBbCc123 | What you type, contrasted with on-screen computer output | machine_name% su Password: |
AaBbCc123 | Command-line placeholder: replace with a real name or value |
To delete a file, type rm filename. |
AaBbCc123 |
Book titles, new words, or terms, or words to be emphasized. |
Read Chapter 6 in User's Guide. These are called class options. You must be root to do this. |
The following table shows the default system prompt and superuser prompt for the C shell, Bourne shell, and Korn shell.
Table P-2 Shell Prompts
Shell |
Prompt |
---|---|
C shell prompt | machine_name% |
C shell superuser prompt | machine_name% |
Bourne shell and Korn shell prompt | $ |
Borne shell and Korn shell superuser prompt | # |