On Wed, 2004-05-12 at 12:44, Matthew Miller wrote: > On Tue, May 11, 2004 at 08:10:30AM -0600, Stephen Smoogen wrote: > > The standard way I have seen it implemented on other versions of Linux > > (here and other large organizations) is that the central authentication > > is used first in the pam stack and if it fails/isnt available you get > > authorized against the local password db which if it works lets you in. > > "Other versions" including Red Hat Linux up until it suddenly stopped > working circa version 7.3. > > <https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=55193> That bug report is over 2 1/2 years old without a single comment from Nalin. Maybe Nalin doesn't maintain it anymore or is too busy - but either way, maybe it should be re-assigned to another engineer? Regards, -Matt -- "Would you buy a car with the hood welded shut?" - Bob Young on the benefits of the open source development model. mhelios - www.fedoraforum.org
Attachment:
signature.asc
Description: This is a digitally signed message part