Previous Topic: Map Foreign Principal NamesNext Topic: z/OS Security Server Support


Example: foreign principle mapping

In this example, the MAJESTERIAL.CLIENT.COM and COLLOSSAL.SUCCESS.COM foreign realms establish trust relationships locally for Kerberos principals king5.

On the first realm, enter:

TSS ADD(lscess1) KERBNAME(king5)
                 major_major_major

On the second realm, enter:

TSS ADD(lclint1) KERBNAME(major_major_major).

On the second realm, where king5 is foreign defines a foreign principal “king5” from the originating foreign realm MAJESTERIAL.CLIENT.COM and associates that principal locally with ACID “client1” in the local TSS.

TSS ADD(SDT) KERBLINK(kclint1) 
             LINKNAME(‘/…/majesterial.client.com/king5’)
             KERBUSER(client1)

On the first realm where major_major_major is foreign, defines a foreign principal “major_major_major” originating from COLLOSSAL.SUCCESS.COM, and associates that principal locally with ACID “succes1” in the local TSS.

TSS ADD(SDT) KERBLINK(kscess1) 
             LINKNAME(‘/…/collossal.success.com/major_major_major’)
             KERBUSER(succes1)