Installing and Administering Internet Services

348 Chapter 11
Secure Internet Services
Overview of the Secure Environment and the Kerberos V5 Protocol
For more information on GSS-API Version 1, refer to RFCs 1508, 1509,
and 1964.
Secure Environment Configurations
Configurations consist of KDCs and client nodes. The figures below
illustrate possible KDC/client configurations. The paragraphs following
the figures describe the nodes in more detail and also discuss
interoperability among the nodes.
Figure 11-2 Client Interoperability with HP DCE and P/SS Security Servers
Figure 11-2 illustrates which security clients can interoperate in
configurations using HP DCE Security Services. Though not shown here,
there might be multiple HP DCE Security Services in the configuration.
HP DCE Security Service (KDC)
HP P/SS
Clients*
Secure
& HP
Services
HP Kerberos
Clients*
Secure
& HP
Services
Non-HP
Kerberos
Secure
& Non-HP
Services
Clients*
(C)
(D)
(E)
* "Clients" are security clients.
They can be application clients or application servers.
(A)
HP DCE
Clients*
Secure
& HP
Services
(B)
Internet
Internet
Internet
Internet
or
HP Praesidium/Security Service (KDC)