Solved

how to replace standard system authetication with ldap

Posted on 2000-02-17
2
216 Views
Last Modified: 2013-12-05
How can the systems standard i.e. shadow and MD5 authetication can be changed to LDAP server so that it will by default authenticated through LDAP server.
0
Comment
Question by:xpash
2 Comments
 
LVL 40

Accepted Solution

by:
jlevie earned 170 total points
ID: 2534798
Depends on the Linux distribution. If yours uses pam, (you'll have /etc/pam.d) like Redhat & others, you install a pam module that can to the authentication against an LDAP server can change the various pam.d files to use that module. Withou a pam capability you're pretty much out of luck.
0
 

Author Comment

by:xpash
ID: 2537480
Yes u r correct . I m using RH Linux .and the shared library module is pam_ldap.so which i must specify in the files in the pam.d dir.such as login ,pop,rlogin etc..
Thanx alot
0

Featured Post

Free learning courses: Active Directory Deep Dive

Get a firm grasp on your IT environment when you learn Active Directory best practices with Veeam! Watch all, or choose any amount, of this three-part webinar series to improve your skills. From the basics to virtualization and backup, we got you covered.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

I have seen several blogs and forum entries elsewhere state that because NTFS volumes do not support linux ownership or permissions, they cannot be used for anonymous ftp upload through the vsftpd program.   IT can be done and here's how to get i…
This article will explain how to establish a SSH connection to Ubuntu through the firewall and using a different port other then 22. I have set up a Ubuntu virtual machine in Virtualbox and I am running a Windows 7 workstation. From the Ubuntu vi…
Two types of users will appreciate AOMEI Backupper Pro: 1 - Those with PCIe drives (and haven't found cloning software that works on them). 2 - Those who want a fast clone of their boot drive (no re-boots needed) and it can clone your drive wh…
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…

808 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question