(no subject)

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



--KFztAG8eRSV9hGtP
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable

On Wed, May 29, 2002 at 02:35:20PM -0000, Rohan  Bairat wrote:
> Hi Friends,
> I am new to these technologies and i want to study about PAM in=20
> detail .....

> I want to allow remote users to connect to my machine for FTP=20
> CVS--using SSH and mail...

> Can any one please suggest me good document to read ....which has=20
> information about PAM stuff and how to configure it for above=20
> mentioned services....

> Is kerberos a better authentication technique??????

Kerberos and PAM address two different aspects of system security.
PAM's goal is to provide a flexible system, with Kerberos as just one of
the available authentication backends; Kerberos seeks security an single
sign-on capabilities with a unified system.  PAM excels at providing
support for local applications that need to authenticate users, whereas
I prefer Kerberos for client-server applications.  Since it sounds like
you're concerned mostly with network services, I recommend Kerberos as a
better fit for your applications.

Steve Langasek
postmodern programmer

--KFztAG8eRSV9hGtP
Content-Type: application/pgp-signature
Content-Disposition: inline

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.6 (GNU/Linux)
Comment: For info see http://www.gnupg.org

iD8DBQE89PPkKN6ufymYLloRAgJBAKCwHGqeCg6kTnOnJtAtNefcOg+sOQCfRw4M
VuIAe+CLwtEqQd0wlDmThiY=
=O19p
-----END PGP SIGNATURE-----

--KFztAG8eRSV9hGtP--





[Index of Archives]     [Fedora Users]     [Kernel]     [Red Hat Install]     [Linux for the blind]     [Gimp]

  Powered by Linux