(no subject)

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



--ULyIDA2m8JTe+TiX
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable

On Wed, May 29, 2002 at 06:19:39PM -0000, Rohan  Bairat wrote:
> Hi Steve
> Thanks for the email

> But steve according to my knowledge kerberos needs a clock=20
> synchronization i mean we need to install the clock=20
> synchronization software in the machine which we use to=20
> connect....

> Now the remote user may log in thru diff computer / network ..and=20
> then for syschronization he needs to have that s/w installed

> Is it true?

> My goal is to allow people work on my code by logging in to my=20
> system and checking out code using cvs connecting using SSH and i=20
> need a authorization right???

Yes, Kerberos involves setting up a fair amount of infrastructure.  If
all you have is a single server on which you want to run CVS over SSH,
then setting up accounts in the system password file is probably a lot
easier than setting up Kerberos -- whether or not you use PAM.

Steve Langasek
postmodern programmer


> On Wed, 29 May 2002 Steve Langasek wrote :
> >On Wed, May 29, 2002 at 02:35:20PM -0000, Rohan  Bairat wrote:
> >> Hi Friends,
> >> I am new to these technologies and i want to study about PAM=20
> >in
> >> detail .....
> >
> >> I want to allow remote users to connect to my machine for=20
> >FTP
> >> CVS--using SSH and mail...
> >
> >> Can any one please suggest me good document to read ....which=20
> >has
> >> information about PAM stuff and how to configure it for=20
> >above
> >> mentioned services....
> >
> >> Is kerberos a better authentication technique??????
> >
> >Kerberos and PAM address two different aspects of system=20
> >security.
> >PAM's goal is to provide a flexible system, with Kerberos as just=20
> >one of
> >the available authentication backends; Kerberos seeks security an=20
> >single
> >sign-on capabilities with a unified system.  PAM excels at=20
> >providing
> >support for local applications that need to authenticate users,=20
> >whereas
> >I prefer Kerberos for client-server applications.  Since it=20
> >sounds like
> >you're concerned mostly with network services, I recommend=20
> >Kerberos as a
> >better fit for your applications.
> >
> >Steve Langasek
> >postmodern programmer
>=20
> _________________________________________________________
> Click below to visit monsterindia.com and review jobs in India or=20
> Abroad
> http://monsterindia.rediff.com/jobs
>=20
>=20
>=20
> _______________________________________________
> 
> Pam-list@redhat.com
> https://listman.redhat.com/mailman/listinfo/pam-list

--ULyIDA2m8JTe+TiX
Content-Type: application/pgp-signature
Content-Disposition: inline

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.6 (GNU/Linux)
Comment: For info see http://www.gnupg.org

iD8DBQE89STeKN6ufymYLloRAltCAJ9TPnGdsiQJnyQeEOQvoyrZRkqCSACdEGQY
BqXRrFJtv+LqzNZ+Gkb/yvM=
=BqrC
-----END PGP SIGNATURE-----

--ULyIDA2m8JTe+TiX--





[Index of Archives]     [Fedora Users]     [Kernel]     [Red Hat Install]     [Linux for the blind]     [Gimp]

  Powered by Linux