
IBM Distributed Computing Environment Version 3.1 for AIX and Solaris: IBM Administration Guide—Introduction IBM Distributed Computing Environment Version 3.1 for AIX and Solaris: IBM Administration Guide—Introduction Note Before using this document, read the general information under “Appendix. Notices” on page 89. First Edition (August 1999) This edition applies to Version 3.1 of IBM Distributed Computing Environment for AIX and Solaris and to all subsequent releases and modifications until otherwise indicated in new editions or technical newsletters. Order publications through your IBM representative or the IBM branch office serving your locality. Publications are not stocked at the address below. IBM welcomes your comments. Send your comments to the following address: International Business Machines Corporation Department VLXA 11400 Burnet Road Austin, Texas 78758 When you send information to IBM, you grant IBM a nonexclusive right to use or distribute the information in any way it believes appropriate without incurring any obligation to you. This documentation and the software to which it relates are derived in part from materials supplied by the following: Copyright © 1995, 1996 Open Software Foundation, Inc. Copyright © 1990, 1991, 1992, 1993, 1994, 1995, 1996 Digital Equipment Corporation Copyright © 1990, 1991, 1992, 1993, 1994, 1995, 1996 Hewlett-Packard Company Copyright © 1989, 1990, 1991, 1992, 1993, 1994, 1995, 1996 Transarc Corporation Copyright © 1990, 1991 Siemens Nixdorf Informationssysteme AG Copyright © 1988, 1989, 1995 Massachusetts Institute of Technology Copyright © 1979, 1980, 1983, 1986, 1988, 1989, 1991, 1992, 1993, 1994 The Regents of the University of California Copyright © 1995, 1996 Hitachi, Ltd. Licensee agrees that it will comply with and will require its Distributors to comply with all then applicable laws, rules and regulations (i) relating to the export or re-export of technical data when exporting or re-exporting a Licensed Program or Documentation, and (ii) required to limit a governmental agency’s rights in the Licensed Program, Documentation or associated technical data by affixing a Restricted Rights notice to the Licensed Program, Documentation and/or technical data equivalent to or substantially as follows: ²Use, duplication or disclosure by the U.S. Government is subject to restrictions as set forth in DFARS 52.227-7013(c)(1)(i)-(ii); FAR 52.227-19; and FAR 52.227-14, Alternate III, as applicable or in the equivalent clause of any other applicable Federal government regulations.² © Copyright International Business Machines Corporation 1990, 1999. All rights reserved. US Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Figures ........................... vii Tables ........................... ix About This Book ....................... xi Audience........................... xi Applicability .......................... xi Purpose ........................... xi Document Usage........................ xi Related Documents ....................... xii Typographic and Keying Conventions ................ xii Problem Reporting .......................xiii Pathnames of Directories and Files in DCE Documentation ........xiii Part 1. Introduction to DCE System Administration .............. 1 Chapter 1. Introduction to DCE for Administrators .......... 3 Clients and Servers ....................... 3 Remote Procedure Call ..................... 4 The Cell ........................... 4 The Namespace ........................ 5 The Filespace ......................... 5 Principals .......................... 5 Access Control Lists ...................... 6 Caching ........................... 6 Replication .......................... 6 Environment Variables ...................... 6 Chapter 2. Global and Cell Considerations ............. 7 Establishing a Cell Name..................... 8 Establishing a DNS Cell Name.................. 9 The Cell Namespace ......................10 Determining Cell Boundaries ..................10 Keeping Cells Stable .....................10 Types of Cell Namespace Entries.................10 CDS Namespace Replication Considerations ............13 Planning for Access Control ....................13 Chapter 3. Client and Server Considerations ............15 Requirements for DCE Client Machines ...............15 RPC Client Programs .....................15 Security Service Client Programs .................16 Audit Service Client Programs ..................16 CDS Client Programs .....................16 DTS Client Programs .....................16 Slim Client Programs .....................17 Requirements for DCE Server Machines ...............19 Files Installed on DCE Server Machines ..............19 DCE RPC Server Programs...................19 Security Server Processes ...................19 Audit Server Processes ....................20 CDS and GDA Server Processes .................20 DTS Server Programs .....................21 © Copyright IBM Corp. 1990, 1999 iii DCE Administration Utilities ....................22 DCE Control Program .....................22 DCE RPC Administration Programs ................22 Security Service Administration Programs..............22 CDS Administration Programs ..................23 DTS Administration Programs ..................23 Programs for DCE Remote Administration Machines..........23 Application Development Environment Machine ............24 Chapter 4. Location of Installed DCE Files .............25 The /opt/dcelocal Subtree ....................25 Conventional UNIX Directories (AIX only) ...............26 File Locations .........................26 ForAIX..........................26 For Solaris .........................27 Configuration Files Created at Runtime ..............28 File Systems to Create and Mount (AIX only) ............28 DCE Daemon Core Locations ...................29 Chapter 5. Overview of DCE Maintenance..............31 Changing the Network Address of a DCE Machine ...........31 CDS Maintenance Tasks .....................31 Monitoring CDS .......................32 Managing CDS .......................32 CDS Security and Access Control ................33 DTS Maintenance Tasks .....................33 Managing the Distributed Time Service...............33 Modifying System Time ....................34 Security Service Maintenance Tasks.................34 Managing the Security Service..................34 Reconfiguring the Registry ...................36 Removing Expired Credentials Files .................36 Part 2. Additional Configuration Information..................37 Chapter 6. Configuration Response Files ..............39 Key words for DCE Response Files .................39 Cell Section Keywords.....................40 Host Section Keywords ....................41 Keywords for Identifying Machines ................42 Values for the Components Keyword ...............42 Part 3. Appendixes .............................45 Appendix. Moving an Initial CDS Server ..............47 Appendix B. Environment Variables ................49 Audit Variables ........................49 CONFIGURATION .......................51 IDL.............................51 NLS/SECURITY ........................52 RPC............................53 SECURITY ..........................58 Appendix C. The DCE Cell Namespace ...............61 iv IBM DCE Version 3.1 for AIX and Solaris: Administration Guide—Introduction The CDS Space ........................61 The Top-Level CDS Directory ..................62 The CDS hosts Directory ....................65 The CDS subsys Directory ...................68 The Security Space .......................71 The Top-Level Security Directory .................72 The sec/group Directory ....................75 The sec/group/subsys Directory .................78 The sec/principal Directory ...................81 The sec/principal/hosts Directory .................85 Appendix. Notices .......................89 Trademarks..........................91 Index ............................93 Contents v vi IBM DCE Version 3.1 for AIX and Solaris: Administration Guide—Introduction Figures 1. Interaction of Clients and Servers ................ 4 2. Top Level of the Cell Namespace ................ 11 3. The Top-Level CDS Directory .................61 4. The CDS hosts Directory ...................62 5. The CDS subsys Directory ..................62 6. The Top-Level Security Directory ................71 7. The sec/group Directory ...................72 8. The sec/principal Directory ..................72 © Copyright IBM Corp. 1990, 1999 vii viii IBM DCE Version 3.1 for AIX and Solaris: Administration Guide—Introduction Tables 1. DCE Cell Keywords .....................40 2. DCE Host Keywords.....................41 3. Host Identification Value ...................42 4. Components Keywords....................42 5. Components General Keywords ................43 6. Account Keywords .....................44 7. Public Key Certificate Keywords ................44 © Copyright IBM Corp. 1990, 1999 ix x IBM DCE Version 3.1 for AIX and Solaris: Administration Guide—Introduction About This Book The IBM DCE Version 3.1 for AIX and Solaris: Administration Guide provides concepts and procedures that enable you to manage the IBM® for AIX® and Solaris version of the Distributed Computing Environment (DCE). Basic DCE terms are introduced throughout the guide. A glossary for all of the DCE documentation is provided in the IBM DCE Version 3.1 for AIX and Solaris: Introduction to DCE. The IBM DCE Version 3.1 for
Details
-
File Typepdf
-
Upload Time-
-
Content LanguagesEnglish
-
Upload UserAnonymous/Not logged-in
-
File Pages114 Page
-
File Size-