Hot Downloads

×

Notice

The forum is in read only mode.
Welcome, Guest
Username: Password: Remember me
  • Page:
  • 1

TOPIC: user authentication methods in Linux

user authentication methods in Linux 12 years 9 months ago #11034

  • chitti
  • chitti's Avatar Topic Author
  • Offline
  • Frequent Member
  • Frequent Member
  • Posts: 25
  • Thank you received: 0
Documentaion for user authentication methods in Linux ????????????

Re: user authentication methods in Linux 12 years 9 months ago #11035

  • jhun
  • jhun's Avatar
  • Offline
  • Senior Member
  • Senior Member
  • Posts: 356
  • Thank you received: 0
hi,

you may try this link

Re: user authentication methods in Linux 12 years 9 months ago #11036

  • nske
  • nske's Avatar
  • Offline
  • Expert Member
  • Expert Member
  • Posts: 613
  • Thank you received: 0
Also check PAM .

Re: user authentication methods in Linux 12 years 9 months ago #11037

  • chitti
  • chitti's Avatar Topic Author
  • Offline
  • Frequent Member
  • Frequent Member
  • Posts: 25
  • Thank you received: 0
documentation on user authentication methods supported in Unix?????????

Re: user authentication methods in Linux 12 years 9 months ago #11038

  • chitti
  • chitti's Avatar Topic Author
  • Offline
  • Frequent Member
  • Frequent Member
  • Posts: 25
  • Thank you received: 0
Documentation on user authentication methods supported in Macintosh????????????

Re: user authentication methods in Linux 12 years 9 months ago #11041

  • nske
  • nske's Avatar
  • Offline
  • Expert Member
  • Expert Member
  • Posts: 613
  • Thank you received: 0
The two popular centralized authentication systems, PAM and Kerberos, are supported in every well known unix-like and unix-based operating system (GNU Linux, *BSD, Solaris, HP-UX, mac OS X, etc). A search in google for "kerberos" and "Pluggable authentication modules" will return plenty of information sources on these projects.

If you tell us what exactly you need we might be able to point you to a better direction, since PAM and Kerberos are not really authentication methods rather than authentication systems, with the former used commonly on local authentication and the later providing a solid solution for secure authentication through a network.

At the user level they can both work with various authentication interfaces -what you are probably referring to-, like password prompts, smartcards or even biometric validators. The difference is that kerberos is just a protocol, requiring a unique software implementation for each purpose, while PAM is a standard system that can easily utilize and combine other systems (including kerberos) thanks to it's modular design.
  • Page:
  • 1
Time to create page: 0.153 seconds

CCENT/CCNA

Cisco Routers

  • SSL WebVPN
  • Securing Routers
  • Policy Based Routing
  • Router on-a-Stick

VPN Security

  • Understand DMVPN
  • GRE/IPSec Configuration
  • Site-to-Site IPSec VPN
  • IPSec Modes

Cisco Help

  • VPN Client Windows 8
  • VPN Client Windows 7
  • CCP Display Problem
  • Cisco Support App.

Windows 2012

  • New Features
  • Licensing
  • Hyper-V / VDI
  • Install Hyper-V

Linux

  • File Permissions
  • Webmin
  • Groups - Users
  • Samba Setup