Authentication - Red Hat LINUX 7.2 - OFFICIAL LINUX CUSTOMIZATION GUIDE Manual

Hide thumbs Also See for LINUX 7.2 - OFFICIAL LINUX CUSTOMIZATION GUIDE:
Table of Contents

Advertisement

Section 2.6:Authentication

2.6 Authentication

Figure 2–7 Authentication
In the
Authentication
passwords. These options are highly recommended and chosen by default.
The
Authentication Configuration
cation:
NIS
LDAP
Kerberos 5
Hesiod
SMB
Name Switch Cache
They are not enabled by default. To enable one or more of these methods, click the appropriate tab,
click the checkbutton next to
method.
section, select whether to use shadow passwords and md5 encryption for user
page allows you to configure the following methods of authenti-
, and enter the appropriate information for the authentication
Enable
55

Advertisement

Table of Contents
loading

This manual is also suitable for:

Linux 7.2

Table of Contents