Configuring kerberos authentication

Páginas: 8 (1913 palabras) Publicado: 2 de marzo de 2012
Configuring Embedded Kerberos Authentication

configure

Configuring Embedded Kerberos Authentication

For HP product models:
LaserJet 4345mfp, LaserJet 9040mfp, LaserJet 9050mfp, LaserJet 9500mfp, and Digital Sender 9200C

Legal Notice
© Copyright 2006 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Microsoft®, Windows®, andWindows NT®, are U.S. registered trademarks of Microsoft Corporation. All other products mentioned herein might be trademarks of their respective companies. The only warranties for HP products and services are set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting an additional warranty. HP shall not be liable fortechnical or editorial errors or omissions contained herein. This is an HP copyrighted work that may not be reproduced without the permission of HP. Configuring embedded authentication using Kerberos Authentication Rev. 5.21

Contents
Overview........................................................................................... Requiredtool..................................................................................... Step 1: Discovering the LDAP server...................................................... Method 1...................................................................................... Method 2...................................................................................... Step 2: Setting upLDP......................................................................... 1 1 5 5 6 7

Step 3: Kerberos Authentication............................................................ 10 Step 4: Configure the Authentication Manager....................................... 13 Step 5: Configure Addressing Settings.................................................. Step 6: Use the MFP control panel…………………………………………… Troubleshooting………………………………………………………………… 13 15 16

OverviewKerberos is a network authentication protocol. It is designed to provide secure authentication for client/server applications by using secret keys delivered with session tickets. This document provides step-by-step instructions for configuring Kerberos.

Required tool
It is necessary to use Microsoft LDP to configure the MFP for embedded LDAP authentication. Microsoft LDP is a support tool thatships with the Windows Support Tools contained on the Windows OS media. It allows you to connect, bind, and query an LDAP database. Microsoft LDP can be installed and configured by following the instructions below:
Note Another way to obtain the Windows Support tools is to download them from Microsoft at the following address: http://www.microsoft.com/downloads/details.aspx?FamilyId=49AE8576-9BB9-4126-9761-BA8011FABF38&displaylang=en

1. 2.

Browse to the root of the OS media, and open the Support folder. Open the Tools folder.

configure – 1

3.

Double click the SUPTOOLS.MSI file.

4.

Select Next at the Welcome to the Windows Support Tools Setup Wizard.

5.

After reading the licensing agreement, select the I Agree radial button and click Next.

2 – configure

6.

Enter your name andorganization; then click Next.

7.

Select Complete for the installation type; then click Next.

configure – 3

8.

Select Install Now to begin the installation.

4 – configure

9.

Click Finish to complete the installation.

Step 1: Discovering the LDAP server
There are two key methods to discover an available LDAP server on the network.

Method 1
1. Open a command window by clicking on Start →Run and typing cmd.exe in the dialog box. Then press Enter or click OK.

2.

To determine which Windows Active Directory logon server you are logged onto, type the following: echo %logonserver%. Then press Enter. The server that appears (for example: \\TMWS3A) can be used as the LDAP server.

configure – 5

Method 2
You must first discover the name of your domain. 1. To determine the name of...
Leer documento completo

Regístrate para leer el documento completo.

Estos documentos también te pueden resultar útiles

  • Kerberos
  • kerberos
  • Kerberos
  • Kerberos
  • Sniffer y kerberos
  • Protocolo kerberos
  • Autentificacion Kerberos
  • Kerberos

Conviértase en miembro formal de Buenas Tareas

INSCRÍBETE - ES GRATIS