Authentication Configuration - Red Hat LINUX 7.1 - ISERIES Manual

Official red hat linux iseries
Table of Contents

Advertisement

46
Chapter 3:Installing Red Hat Linux
Figure 3–19 User Account Setup
Choose
to create a new user account.
Add
You can also
or
the user accounts you have created or no longer want.
Edit
Delete

3.18 Authentication Configuration

If you are performing a workstation- or server installation, please skip ahead to Section 3.19, Package
Group Selection.
You may skip this section if you will not be setting up network passwords. If you do not know whether
you should do this, please ask your system administrator for assistance.
Unless you are setting up
NIS
authentication, you will notice that only
MD5
and
shadow
passwords
are selected (see Figure 3–20, Authentication Configuration). We recommend you use both to make
your machine as secure as possible.
To configure the NIS option, you must be connected to an NIS network. If you are not sure whether
you are connected to an NIS network, please ask your system administrator.

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the LINUX 7.1 - ISERIES and is the answer not in the manual?

This manual is also suitable for:

Linux 7.1

Table of Contents