Authentication
2.6. Authentication
Figure 2.9. Authentication
In the Authentication section, select whether to use shadow passwords and MD5 encryption for user
passwords. These options are highly recommended and chosen by default.
The Authentication Configuration options allow you to configure the following methods of
authentication:
• NIS
• LDAP
• Kerberos 5
• Hesiod
• SMB
• Name Switch Cache
39
Need help?
Do you have a question about the ENTERPRISE LINUX 4 and is the answer not in the manual?