ACC SHELL

Path : /usr/share/gnome/help/opensuse-manuals/C/
File Upload :
Current File : //usr/share/gnome/help/opensuse-manuals/C/part.auth.html

<html><head><meta http-equiv="Content-Type" content="text/html; charset=ISO-8859-1"><title>Part I. Authentication</title><link rel="stylesheet" href="susebooks.css" type="text/css"><meta name="generator" content="DocBook XSL Stylesheets V1.75.2"><link rel="home" href="index.html" title="Documentation"><link rel="up" href="book.security.html" title="Security Guide"><link rel="prev" href="cha.security.html" title="Chapter 1. Security and Confidentiality"><link rel="next" href="cha.pam.html" title="Chapter 2. Authentication with PAM"></head><body bgcolor="white" text="black" link="#0000FF" vlink="#840084" alink="#0000FF"><div class="navheader"><table width="100%" summary="Navigation header" border="0" class="bctable"><tr><td width="80%"><div class="breadcrumbs"><p><a href="index.html"> Documentation</a><span class="breadcrumbs-sep"> &gt; </span><a href="book.security.html">Security Guide</a><span class="breadcrumbs-sep"> &gt; </span><strong><a accesskey="p" title="Chapter 1. Security and Confidentiality" href="cha.security.html"><span>&#9664;</span></a>  <a accesskey="n" title="Chapter 2. Authentication with PAM" href="cha.pam.html"><span>&#9654;</span></a></strong></p></div></td></tr></table></div><div class="part" title="Part I. Authentication"><div class="titlepage"><div><div><h1 class="title"><a name="part.auth"></a>Part I. Authentication</h1></div></div></div><div class="toc"><p><b>Contents</b></p><dl><dt><span class="chapter"><a href="cha.pam.html">2. Authentication with PAM</a></span></dt><dd><dl><dt><span class="sect1"><a href="cha.pam.html#sec.security.pam.whatis">2.1. What is PAM?</a></span></dt><dt><span class="sect1"><a href="cha.pam.html#sec.pam.struc.files">2.2. Structure of a PAM Configuration File</a></span></dt><dt><span class="sect1"><a href="cha.pam.html#sec.pam.struc.format">2.3. The PAM Configuration of sshd</a></span></dt><dt><span class="sect1"><a href="cha.pam.html#sec.pam.struc.conf">2.4. Configuration of PAM Modules</a></span></dt><dt><span class="sect1"><a href="cha.pam.html#sec.pam.pam-config">2.5. Configuring PAM Using pam-config</a></span></dt><dt><span class="sect1"><a href="cha.pam.html#sec.pam.info">2.6. For More Information</a></span></dt></dl></dd><dt><span class="chapter"><a href="cha.nis.html">3. Using NIS</a></span></dt><dd><dl><dt><span class="sect1"><a href="cha.nis.html#sec.nis.server">3.1. Configuring NIS Servers</a></span></dt><dt><span class="sect1"><a href="cha.nis.html#sec.nis.client">3.2. Configuring NIS Clients</a></span></dt></dl></dd><dt><span class="chapter"><a href="cha.security.ldap.html">4. LDAP&#8212;A Directory Service</a></span></dt><dd><dl><dt><span class="sect1"><a href="cha.security.ldap.html#sec.security.ldap.vs_nis">4.1. LDAP versus NIS</a></span></dt><dt><span class="sect1"><a href="cha.security.ldap.html#sec.security.ldap.tree">4.2. Structure of an LDAP Directory Tree</a></span></dt><dt><span class="sect1"><a href="cha.security.ldap.html#sec.security.ldap.yast">4.3. Configuring an LDAP Server with YaST</a></span></dt><dt><span class="sect1"><a href="cha.security.ldap.html#sec.security.ldap.yast.client">4.4. Configuring an LDAP Client with YaST</a></span></dt><dt><span class="sect1"><a href="cha.security.ldap.html#sec.security.ldap.yast.usergr">4.5. Configuring LDAP Users and Groups in YaST</a></span></dt><dt><span class="sect1"><a href="cha.security.ldap.html#sec.security.ldap.browse">4.6. Browsing the LDAP Directory Tree</a></span></dt><dt><span class="sect1"><a href="cha.security.ldap.html#sec.security.ldap.slapd">4.7. Manually Configuring an LDAP Server</a></span></dt><dt><span class="sect1"><a href="cha.security.ldap.html#sec.security.ldap.data">4.8. Manually Administering LDAP Data</a></span></dt><dt><span class="sect1"><a href="cha.security.ldap.html#sec.security.ldap.info">4.9. For More Information</a></span></dt></dl></dd><dt><span class="chapter"><a href="cha.security.ad.html">5. Active Directory Support</a></span></dt><dd><dl><dt><span class="sect1"><a href="cha.security.ad.html#sec.security.ad.integrate">5.1. Integrating Linux and AD Environments</a></span></dt><dt><span class="sect1"><a href="cha.security.ad.html#sec.security.ad.background">5.2. Background Information for Linux AD Support</a></span></dt><dt><span class="sect1"><a href="cha.security.ad.html#sec.security.ad.config">5.3. Configuring a Linux Client for Active Directory</a></span></dt><dt><span class="sect1"><a href="cha.security.ad.html#sec.security.ad.login">5.4. Logging In to an AD Domain</a></span></dt><dt><span class="sect1"><a href="cha.security.ad.html#sec.security.ad.passwd">5.5. Changing Passwords</a></span></dt></dl></dd><dt><span class="chapter"><a href="cha.security.kerberos.html">6. Network Authentication with Kerberos</a></span></dt><dd><dl><dt><span class="sect1"><a href="cha.security.kerberos.html#sec.security.kerberos.terms">6.1. Kerberos Terminology</a></span></dt><dt><span class="sect1"><a href="cha.security.kerberos.html#sec.security.kerberos.how">6.2. How Kerberos Works</a></span></dt><dt><span class="sect1"><a href="cha.security.kerberos.html#sec.security.kerberos.users">6.3. Users' View of Kerberos</a></span></dt><dt><span class="sect1"><a href="cha.security.kerberos.html#sec.security.kerberos.admin">6.4. Installing and Administering Kerberos</a></span></dt><dt><span class="sect1"><a href="cha.security.kerberos.html#sec.security.kerberos.info">6.5. For More Information</a></span></dt></dl></dd><dt><span class="chapter"><a href="cha.security.fp.html">7. Using the Fingerprint Reader</a></span></dt><dd><dl><dt><span class="sect1"><a href="cha.security.fp.html#sec.security.fp.supported">7.1. Supported Applications and Actions</a></span></dt><dt><span class="sect1"><a href="cha.security.fp.html#sec.security.fp.yast">7.2. Managing Fingerprints with YaST</a></span></dt></dl></dd></dl></div></div><div class="navfooter"><table width="100%" summary="Navigation footer" border="0" class="bctable"><tr><td width="80%"><div class="breadcrumbs"><p><a href="index.html"> Documentation</a><span class="breadcrumbs-sep"> &gt; </span><a href="book.security.html">Security Guide</a><span class="breadcrumbs-sep"> &gt; </span><strong><a accesskey="p" title="Chapter 1. Security and Confidentiality" href="cha.security.html"><span>&#9664;</span></a>  <a accesskey="n" title="Chapter 2. Authentication with PAM" href="cha.pam.html"><span>&#9654;</span></a></strong></p></div></td></tr></table></div></body></html>

ACC SHELL 2018