Summary
In this chapter, we learned how Linux-based systems implement authentication processes and user information lookup using PAM, NSS, and SSSD. We also learned about solutions for centralized authentication and demonstrated how to set up a domain controller that’s compatible with Microsoft Active Directory using Samba software and join that domain from another Linux machine.
In the next chapter, we will learn about high-availability mechanisms in Linux.