Sun Enterprise Authentication Mechanism Guide

Preface

The SunTM Enterprise Authentication Mechanism Guide describes how to install, administer, and use the Sun Enterprise Authentication Mechanism (SEAM) product. SEAM provides a complete implementation of Kerberos V5 for the Solaris 2.6 and Solaris 7 releases.

Most of this book is focused on the steps necessary to install, configure, and maintain the product. In addition, information for users about SEAM has been included, as well as a chapter describing the RPCSEC_GSS Application Programming Interface (API) implementation from a developer's viewpoint.

Who Should Use This Book

This book is designed for the following audiences:

Before You Read This Book

The information for users requires only a basic knowledge of the Solaris operating environment. The information for administrators, chiefly that regarding installation, configuration, and administration of SEAM, requires a broad knowledge of the Solaris operating environment, including network administration topics. The developer's section requires knowledge of Remote Procedure Call (RPC) usage. The installation and maintenance section requires familiarity with standard Solaris installation procedures.

How This Book is Organized

Chapter 1, Introduction to SEAM provides an overview of the SEAM product.

Chapter 2, Planning for SEAM describes the issues that need to be resolved before installing SEAM.

Chapter 3, Configuring SEAM presents the procedures for configuring Key Distribution Center (KDC) servers, SEAM network application servers, SEAM NFS servers, and SEAM clients.

Chapter 4, SEAM Error Messages and Troubleshooting explains the more important error messages produced by SEAM and offers solutions for common problems.

Chapter 5, Administering Principals and Policies includes information about setting up and administering principals, passwords, policies, and other information for each Kerberos realm database, and introduces the SEAM GUI-based tool that can be used for these tasks.

Chapter 6, Using SEAM provides user-level instructions for using SEAM, including: obtaining and using tickets, choosing a password, and using SEAM-based utilities such as ftp and rlogin.

Chapter 7, SEAM Reference describes all of the files that are included in the SEAM release. Also included is a detailed overview of the way the SEAM product works.

Chapter 8, Secure Network Programming with RPCSEC_GSS describes how to use the RPCSEC_GSS API to take advantage of the privacy and integrity security services for RPC-based programs.

Related Books

This is a list of related documentation that is referred to in this book:

Ordering Sun Documents

The SunDocsSM program provides more than 250 manuals from Sun MicrosystemsTM. If you live in the United States, Canada, Europe, or Japan, you can purchase documentation sets or individual manuals using this program.

For a list of documents and how to order them, see the catalog section of the SunExpressTM Internet site at http://www.sun.com/sunexpress. You can also order documentation online (see below).

Accessing Sun Documentation Online

The docs.sun.com Web site enables you to access Sun technical documentation online. You can browse the docs.sun.com archive or search for a specific book title or subject. The URL is http://docs.sun.com.

Typographic Conventions and Shell Prompts

The following table shows the typographic conventions used in this manual.

Table P-1 Typographic Conventions

Typeface or Symbol 

Meaning 

Example 

AaBbCc123

 The names of commands, files, and directories; on-screen computer output

Edit your .login file.

Use ls -a to list all files.

machine_name% you have mail.

AaBbCc123

 What you type, contrasted with on-screen computer outputmachine_name% su Password:

AaBbCc123

 Command-line placeholder: replace with a real name or value

To delete a file, type rm filename.

AaBbCc123

Book titles, new words, or terms, or words to be emphasized. 

Read Chapter 6 in User's Guide.

These are called class options.

You must be root to do this.

The following table shows the default system prompt and superuser prompt for the C shell, Bourne shell, and Korn shell.

Table P-2 Shell Prompts

Shell 

Prompt 

 C shell promptmachine_name%
 C shell superuser promptmachine_name%
 Bourne shell and Korn shell prompt$
 Borne shell and Korn shell superuser prompt#