Hot Downloads

Welcome, Guest
Username: Password: Remember me

TOPIC: user authentication methods in Linux

user authentication methods in Linux 11 years 1 month ago #11034

  • chitti
  • chitti's Avatar
  • Offline
  • Frequent Member
  • Posts: 25
  • Karma: 0
Documentaion for user authentication methods in Linux ????????????
The administrator has disabled public write access.

Re: user authentication methods in Linux 11 years 1 month ago #11035

  • jhun
  • jhun's Avatar
  • Offline
  • Senior Member
  • Posts: 356
  • Karma: 0
hi,

you may try this link
The administrator has disabled public write access.

Re: user authentication methods in Linux 11 years 1 month ago #11036

  • nske
  • nske's Avatar
  • Offline
  • Expert Member
  • Posts: 613
  • Karma: 0
Also check PAM.
The administrator has disabled public write access.

Re: user authentication methods in Linux 11 years 1 month ago #11037

  • chitti
  • chitti's Avatar
  • Offline
  • Frequent Member
  • Posts: 25
  • Karma: 0
documentation on user authentication methods supported in Unix?????????
The administrator has disabled public write access.

Re: user authentication methods in Linux 11 years 1 month ago #11038

  • chitti
  • chitti's Avatar
  • Offline
  • Frequent Member
  • Posts: 25
  • Karma: 0
Documentation on user authentication methods supported in Macintosh????????????
The administrator has disabled public write access.

Re: user authentication methods in Linux 11 years 1 month ago #11041

  • nske
  • nske's Avatar
  • Offline
  • Expert Member
  • Posts: 613
  • Karma: 0
The two popular centralized authentication systems, PAM and Kerberos, are supported in every well known unix-like and unix-based operating system (GNU Linux, *BSD, Solaris, HP-UX, mac OS X, etc). A search in google for "kerberos" and "Pluggable authentication modules" will return plenty of information sources on these projects.

If you tell us what exactly you need we might be able to point you to a better direction, since PAM and Kerberos are not really authentication methods rather than authentication systems, with the former used commonly on local authentication and the later providing a solid solution for secure authentication through a network.

At the user level they can both work with various authentication interfaces -what you are probably referring to-, like password prompts, smartcards or even biometric validators. The difference is that kerberos is just a protocol, requiring a unique software implementation for each purpose, while PAM is a standard system that can easily utilize and combine other systems (including kerberos) thanks to it's modular design.
The administrator has disabled public write access.
Time to create page: 0.079 seconds

CCENT/CCNA

Cisco Routers

  • SSL WebVPN
  • Securing Routers
  • Policy Based Routing
  • Router on-a-Stick

VPN Security

  • Understand DMVPN
  • GRE/IPSec Configuration
  • Site-to-Site IPSec VPN
  • IPSec Modes

Cisco Help

  • VPN Client Windows 8
  • VPN Client Windows 7
  • CCP Display Problem
  • Cisco Support App.

Windows 2012

  • New Features
  • Licensing
  • Hyper-V / VDI
  • Install Hyper-V

Linux

  • File Permissions
  • Webmin
  • Groups - Users
  • Samba Setup