Authentication - Red Hat ENTERPRISE LINUX 4 System Administration Manual

Hide thumbs Also See for ENTERPRISE LINUX 4:
Table of Contents

Advertisement

Authentication

2.6. Authentication
Figure 2.9. Authentication
In the Authentication section, select whether to use shadow passwords and MD5 encryption for user
passwords. These options are highly recommended and chosen by default.
The Authentication Configuration options allow you to configure the following methods of
authentication:
• NIS
• LDAP
• Kerberos 5
• Hesiod
• SMB
• Name Switch Cache
39

Advertisement

Table of Contents
loading

Table of Contents