This section describes the migration path for the DCE application. The
environment must be migrated in the order shown in the following migration
roadmap, which is explained in the upcoming sections:
1.Fulfill the software requirements.
2.Configure a DCE security replica server to store its security registry in a
shared LDAP directory (IBM Directory Server).
3.Configure the IBM Network Authentication Service (Kerberos) for
authentication using the data in the LDAP directory.
4.Configure the IBM Tivoli Access Manager for authorization using the data in
the LDAP directory.
5.Configure the W ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month, and much more.