Thanks for all the info , Yes I am thinking of taking all windows desktops out of the environment , but yes there will be some windows based laptops in the network too. Since i am new to LDAP , b4 i get started i wanted to clear a few things . LDAP can be used in assigning network resource permission ??? for profile scripts where shall i look ? Cheers! On Tuesday 04 November 2003 00:26, Justin Banks wrote: > Ken Rossman wrote > > > One other gotcha I ran into, by the way, was that a centralized password > > authentication scheme could run into trouble when there were Sun/Solaris > > machines in the mix that were earlier than Solaris 9. The reason is > > that MD5 encryption (and someone correct me if I am wrong about this) > > is what Linux (and other systems these days) are using for password > > encryption, and Solaris, earlier than S9, did not offer the option to > > plug in alternate encryption such as MD5 ("crypt" is apparently the > > default -- I am still learning about this). > > True, although if you use ssh and set up your authorized_keys, it won't > matter, and you can mix-n-match as much as you'd like. If you want users > to have to type their passwords, or if folks are logging in on the console, > you're asbolutely correct, in my experience. > > justinb > > -- > Justin Banks > Constant Data, Inc. > http://www.constantdata.com -- Syed Atif Ali Desk: 971 4 3911914 _/_/_/_/_/ _/_/_/ _/ _/ _/ _/ _/ _/ _/ _/_/_/ _/ -- -- redhat-list mailing list unsubscribe mailto:redhat-list-request@xxxxxxxxxx?subject=unsubscribe https://www.redhat.com/mailman/listinfo/redhat-list