By: geoffc

June 11, 2009 2:06 pm


Troubleshooting pam_ldap Against eDirectory Issues

Geoff Carman explains Pluggable Authentication Modules. Learn how to configure them, and how to troubleshoot them when things go awry.

Read More

By: tukaram

August 28, 2008 3:13 pm


Configuration of pdb_nds in Samba server for NDS authentication

pdb_nds is a back-end LDAP authentication method for Samba server. This back-end module provides authentication to the users to the Novell eDirectory™ server (NDS).

Read More

By: mfaris01

April 22, 2008 5:27 pm


Configuring Linux User Management on non-OES2, SLES 10 Servers

Looking for a way to provide a standard across all your SLES 10 servers to use the same eDirectory authentication for local access? In this article, we will successfully configure LUM on a “non-OES2”, SLES 10 server to allow users in your eDirectory LUM-enabled group to authenticate to this server without creating local accounts, using their eDirectory ID’s and passwords.

Read More

By: brownc4

April 10, 2008 7:31 am


Adding NT Domain Authentication to Apache and Samba on SLES\openSUSE Servers

Ever wonder how to enable domain logins for Samba shares and Apache websites without the lengthy Kerberos setup or allowing anyone to login to the server? Not only is this possible, but is easily done with only 1 open source third party module needed.

Read More

By: cseader

February 15, 2008 11:10 am


SLES 9 Authentication to Active Directory

Cameron Seader explains how to setup authentication for a SLES 9 client server to a Windows Active Directory Server.

Read More

By: DamianMyerscough

February 12, 2008 5:46 am


PAM (Pluggable Authentication Module) USB Authentication

In this article we are going to look at setting up a USB device to perform authentication using the pam_usb PAM module. pam_usb provides authentication for Linux using standard USB devices and other type of media i.e. (SD, MMC, etc).

Read More

By: DamianMyerscough

February 5, 2008 8:23 pm


SSH (Secure Shell) Tricks II

This article is part two of SSH tricks. In this article we will take a look at public key authentication, building a list of known hosts using the ssh-keyscan utility, and installing the DenyHosts package to help defend against brute force attacks.

Read More

By: utlemming

January 25, 2008 5:08 pm


Implementing boot.crypter for USB token/password authentication of encrypted hard drives and swap space

In some cases, physical security cannot always be secured. Using LUKS for disk encryption and the tool, boot.crypter, you can safely and securely encrypt data using USB tokens or a password.

Read More

By: DamianMyerscough

December 5, 2007 2:50 pm


Biometric Fingerprint Scan

Damian Myerscough explains how to setup and configure biometric fingerprint scanning for logging into your workstations.

Read More