Search icon CANCEL
Subscription
0
Cart icon
Your Cart (0 item)
Close icon
You have no products in your basket yet
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Conferences
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
Implementing Samba 4

You're reading from   Implementing Samba 4 Exploit the real power of Samba 4 Server by leveraging the benefits of an Active Directory Domain Controller.

Arrow left icon
Product type Paperback
Published in Apr 2014
Publisher
ISBN-13 9781782166580
Length 284 pages
Edition Edition
Arrow right icon
Author (1):
Arrow left icon
Marcelo Leal Marcelo Leal
Author Profile Icon Marcelo Leal
Marcelo Leal
Arrow right icon
View More author details
Toc

Table of Contents (19) Chapters Close

Implementing Samba 4
Credits
Foreword
About the Author
Acknowledgments
About the Reviewers
www.PacktPub.com
Preface
1. Installing the Samba 4 Server FREE CHAPTER 2. Provisioning Samba 4 as an AD Domain Controller 3. Managing the Samba Active Directory Server 4. Replacing a Microsoft Windows Active Directory Server 5. Upgrading from Samba Server Version 3 6. Printing and File Services 7. Extending the Active Directory Schema Using Samba 4 8. Implementing a Highly Available Distributed File Server 9. The Samba 4 Python Scripting Interface References
Index

Implementing the AD authentication and authorization for GNU/Linux systems


When we start to talk about GNU/Linux operating systems' authentication and authorization mechanisms, we need to understand more about two important subsystems of this environment: PAM and NSS.

Pluggable Authentication Modules (PAM) is a modern system that relies on specific libraries to provide us with authentication services. As a general Application Programming Interface (API), all applications that are PAM-aware (for example, builds supporting PAM) can be integrated by the system administrator and can be authenticated using any authentication method that the PAM is configured to. This gives a lot of flexibility to the system administrators and also provides a centralized point to handle the users' authentication very effectively.

In an example scenario where an application is built to use PAM for authentication and the PAM subsystem is configured to authenticate users accessing local files (for example, /etc...

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $19.99/month. Cancel anytime
Banner background image