Solved

linux authentication

Posted on 2011-02-16
5
1,052 Views
Last Modified: 2012-05-11
Hi,

I have installed git on my windows machine. When I ssh into a linux box (username and password) I use to get into linux are active directory username and password. Where in fedora is it configured that where would it get authenticated from ?
0
Comment
Question by:aashee
5 Comments
 
LVL 16

Accepted Solution

by:
JammyPak earned 125 total points
ID: 34912841
have a look in /etc/ldap.conf and /etc/nsswitch.conf - your AD info could be defined in there
0
 

Author Comment

by:aashee
ID: 34913055

What is difference between these two files ?
0
 
LVL 18

Assisted Solution

by:Jerry Miller
Jerry Miller earned 125 total points
ID: 34913223
/etc/ldap.conf contains configuration information for which server holds your LDAP information.

/etc/nsswitch.conf is used to configure which services are to be used to determine information such as hostnames, password files, and group files.
http://www.faqs.org/docs/securing/chap6sec71.html
0
 
LVL 1

Expert Comment

by:JackSperow
ID: 34914362
Hi.. have you try this link..
u need to add your linux client with ADC
http://onlamp.com/pub/a/onlamp/2008/04/01/step-by-step-using-samba-to-join-a-windows-domain.html
0
 
LVL 1

Expert Comment

by:JackSperow
ID: 34914433
There are 2 alternatives to authenticate against Active Directory:

Using the kerberos client (requires Active Directory)
Using Winbind & samba client
In my opinion, option 1 is the cleanest. I definitely found it more simple to setup. Option 2 offers some additional features, notably the use of th net command through which you can enumerate domain users and more. However on most workstations this will not be required. Therefore, if you have active directory i recommend option 1.

0

Featured Post

Ransomware: The New Cyber Threat & How to Stop It

This infographic explains ransomware, type of malware that blocks access to your files or your systems and holds them hostage until a ransom is paid. It also examines the different types of ransomware and explains what you can do to thwart this sinister online threat.  

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Little introduction about CP: CP is a command on linux that use to copy files and folder from one location to another location. Example usage of CP as follow: cp /myfoder /pathto/destination/folder/ cp abc.tar.gz /pathto/destination/folder/ab…
SSH (Secure Shell) - Tips and Tricks As you all know SSH(Secure Shell) is a network protocol, which we use to access/transfer files securely between two networked devices. SSH was actually designed as a replacement for insecure protocols that sen…
Learn several ways to interact with files and get file information from the bash shell. ls lists the contents of a directory: Using the -a flag displays hidden files: Using the -l flag formats the output in a long list: The file command gives us mor…
Get a first impression of how PRTG looks and learn how it works.   This video is a short introduction to PRTG, as an initial overview or as a quick start for new PRTG users.

803 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question