Follow Techotopia on Twitter

On-line Guides
All Guides
eBook Store
iOS / Android
Linux for Beginners
Office Productivity
Linux Installation
Linux Security
Linux Utilities
Linux Virtualization
Linux Kernel
System/Network Admin
Programming
Scripting Languages
Development Tools
Web Development
GUI Toolkits/Desktop
Databases
Mail Systems
openSolaris
Eclipse Documentation
Techotopia.com
Virtuatopia.com
Answertopia.com

How To Guides
Virtualization
General System Admin
Linux Security
Linux Filesystems
Web Servers
Graphics & Desktop
PC Hardware
Windows
Problem Solutions
Privacy Policy

  




 

 

NOTE: CentOS Enterprise Linux is built from the Red Hat Enterprise Linux source code. Other than logo and name changes CentOS Enterprise Linux is compatible with the equivalent Red Hat version. This document applies equally to both Red Hat and CentOS Enterprise Linux.

27.2. Authentication

The Authentication tab allows for the configuration of network authentication methods. To enable an option, click the empty checkbox beside it. To disable an option, click the checkbox beside it to clear the checkbox.

Figure 27-2. Authentication

The following explains what each option configures:

  • Enable Kerberos Support — Select this option to enable Kerberos authentication. Click the Configure Kerberos button to configure:

    • Realm — Configure the realm for the Kerberos server. The realm is the network that uses Kerberos, composed of one or more KDCs and a potentially large number of clients.

    • KDC — Define the Key Distribution Center (KDC), which is the server that issues Kerberos tickets.

    • Admin Servers — Specify the administration server(s) running kadmind.

    The krb5-libs and krb5-workstation packages must be installed for this option to work. Refer to the Red Hat Enterprise Linux Reference Guide for more information on Kerberos.

  • Enable LDAP Support — Select this option to have standard PAM-enabled applications use LDAP for authentication. Click the Configure LDAP button to specify the following:

    • Use TLS to encrypt connections — Use Transport Layer Security to encrypt passwords sent to the LDAP server.

    • LDAP Search Base DN — Retrieve user information by its Distinguished Name (DN).

    • LDAP Server — Specify the IP address of the LDAP server.

    The openldap-clients package must be installed for this option to work. Refer to the Red Hat Enterprise Linux Reference Guide for more information about LDAP.

  • Use Shadow Passwords — Select this option to store passwords in shadow password format in the /etc/shadow file instead of /etc/passwd. Shadow passwords are enabled by default during installation and are highly recommended to increase the security of the system.

    The shadow-utils package must be installed for this option to work. For more information about shadow passwords, refer to the Users and Groups chapter in the Red Hat Enterprise Linux Reference Guide.

  • Enable SMB Support — This option configures PAM to use an SMB server to authenticate users. Click the Configure SMB button to specify:

    • Workgroup — Specify the SMB workgroup to use.

    • Domain Controllers — Specify the SMB domain controllers to use.

  • Winbind — Select this option to configure the system to connect to a Windows Active Directory or a Windows domain controller. User information can be accessed, as well as server authentication options can be configured.

  • Use MD5 Passwords — Select this option to enable MD5 passwords, which allows passwords to be up to 256 characters instead of eight characters or less. It is selected by default during installation and is highly recommended for increased security.

 
 
  Published under the terms of the GNU General Public License Design by Interspire