--ULyIDA2m8JTe+TiX Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Content-Transfer-Encoding: quoted-printable On Wed, May 29, 2002 at 06:19:39PM -0000, Rohan Bairat wrote: > Hi Steve > Thanks for the email > But steve according to my knowledge kerberos needs a clock=20 > synchronization i mean we need to install the clock=20 > synchronization software in the machine which we use to=20 > connect.... > Now the remote user may log in thru diff computer / network ..and=20 > then for syschronization he needs to have that s/w installed > Is it true? > My goal is to allow people work on my code by logging in to my=20 > system and checking out code using cvs connecting using SSH and i=20 > need a authorization right??? Yes, Kerberos involves setting up a fair amount of infrastructure. If all you have is a single server on which you want to run CVS over SSH, then setting up accounts in the system password file is probably a lot easier than setting up Kerberos -- whether or not you use PAM. Steve Langasek postmodern programmer > On Wed, 29 May 2002 Steve Langasek wrote : > >On Wed, May 29, 2002 at 02:35:20PM -0000, Rohan Bairat wrote: > >> Hi Friends, > >> I am new to these technologies and i want to study about PAM=20 > >in > >> detail ..... > > > >> I want to allow remote users to connect to my machine for=20 > >FTP > >> CVS--using SSH and mail... > > > >> Can any one please suggest me good document to read ....which=20 > >has > >> information about PAM stuff and how to configure it for=20 > >above > >> mentioned services.... > > > >> Is kerberos a better authentication technique?????? > > > >Kerberos and PAM address two different aspects of system=20 > >security. > >PAM's goal is to provide a flexible system, with Kerberos as just=20 > >one of > >the available authentication backends; Kerberos seeks security an=20 > >single > >sign-on capabilities with a unified system. PAM excels at=20 > >providing > >support for local applications that need to authenticate users,=20 > >whereas > >I prefer Kerberos for client-server applications. Since it=20 > >sounds like > >you're concerned mostly with network services, I recommend=20 > >Kerberos as a > >better fit for your applications. > > > >Steve Langasek > >postmodern programmer >=20 > _________________________________________________________ > Click below to visit monsterindia.com and review jobs in India or=20 > Abroad > http://monsterindia.rediff.com/jobs >=20 >=20 >=20 > _______________________________________________ > > Pam-list@redhat.com > https://listman.redhat.com/mailman/listinfo/pam-list --ULyIDA2m8JTe+TiX Content-Type: application/pgp-signature Content-Disposition: inline -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.0.6 (GNU/Linux) Comment: For info see http://www.gnupg.org iD8DBQE89STeKN6ufymYLloRAltCAJ9TPnGdsiQJnyQeEOQvoyrZRkqCSACdEGQY BqXRrFJtv+LqzNZ+Gkb/yvM= =BqrC -----END PGP SIGNATURE----- --ULyIDA2m8JTe+TiX--