Novell LINUX ENTERPRISE DESKTOP 11 - SECURITY GUIDE 17-03-2009 Manual page 4

Hide thumbs Also See for LINUX ENTERPRISE DESKTOP 11 - SECURITY GUIDE 17-03-2009:
Table of Contents

Advertisement

5.1
Integrating Linux and AD Environments . . . . . . . . . . . . . . . .
5.2
5.3
5.4
Logging In to an AD Domain . . . . . . . . . . . . . . . . . . . .
5.5
Changing Passwords . . . . . . . . . . . . . . . . . . . . . . . .
6.1
Kerberos Terminology . . . . . . . . . . . . . . . . . . . . . . .
6.2
How Kerberos Works . . . . . . . . . . . . . . . . . . . . . . .
6.3
Users' View of Kerberos . . . . . . . . . . . . . . . . . . . . . .
6.4
For More Information . . . . . . . . . . . . . . . . . . . . . . .
7.1
Supported Applications and Actions . . . . . . . . . . . . . . . . .
7.2
Managing Fingerprints with YaST . . . . . . . . . . . . . . . . . .
8.1
Security Overview . . . . . . . . . . . . . . . . . . . . . . . . .
8.2
8.3
8.4
Boot Settings . . . . . . . . . . . . . . . . . . . . . . . . . . .
8.5
Login Settings . . . . . . . . . . . . . . . . . . . . . . . . . .
8.6
User Addition . . . . . . . . . . . . . . . . . . . . . . . . . .
8.7
Miscellaneous Settings . . . . . . . . . . . . . . . . . . . . . . .
9.1
9.2
Authorization Types . . . . . . . . . . . . . . . . . . . . . . . .
9.3
Modifying and Setting Privileges . . . . . . . . . . . . . . . . . . .
10.1
Traditional File Permissions . . . . . . . . . . . . . . . . . . . . .
10.2
Advantages of ACLs . . . . . . . . . . . . . . . . . . . . . . . .
10.3
Definitions . . . . . . . . . . . . . . . . . . . . . . . . . . . .
10.4
Handling ACLs . . . . . . . . . . . . . . . . . . . . . . . . . .
10.5
ACL Support in Applications . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . .
47
47
48
54
57
59
61
62
63
66
67
69
69
70
73
75
75
76
77
78
78
79
79
81
81
82
84
93
93
95
95
96
104

Advertisement

Table of Contents
loading

This manual is also suitable for:

Suse linux enterprise desktop 11

Table of Contents