Search icon CANCEL
Subscription
0
Cart icon
Cart
Close icon
You have no products in your basket yet
Save more on your purchases!
Savings automatically calculated. No voucher code required
Arrow left icon
All Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Newsletters
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
Implementing Samba 4

You're reading from  Implementing Samba 4

Product type Book
Published in Apr 2014
Publisher
ISBN-13 9781782166580
Pages 284 pages
Edition 1st Edition
Languages
Author (1):
Marcelo Leal Marcelo Leal
Profile icon Marcelo Leal
Toc

Table of Contents (19) Chapters close

Implementing Samba 4
Credits
Foreword
About the Author
Acknowledgments
About the Reviewers
www.PacktPub.com
Preface
1. Installing the Samba 4 Server 2. Provisioning Samba 4 as an AD Domain Controller 3. Managing the Samba Active Directory Server 4. Replacing a Microsoft Windows Active Directory Server 5. Upgrading from Samba Server Version 3 6. Printing and File Services 7. Extending the Active Directory Schema Using Samba 4 8. Implementing a Highly Available Distributed File Server 9. The Samba 4 Python Scripting Interface References
Index

Implementing the AD authentication and authorization for GNU/Linux systems


When we start to talk about GNU/Linux operating systems' authentication and authorization mechanisms, we need to understand more about two important subsystems of this environment: PAM and NSS.

Pluggable Authentication Modules (PAM) is a modern system that relies on specific libraries to provide us with authentication services. As a general Application Programming Interface (API), all applications that are PAM-aware (for example, builds supporting PAM) can be integrated by the system administrator and can be authenticated using any authentication method that the PAM is configured to. This gives a lot of flexibility to the system administrators and also provides a centralized point to handle the users' authentication very effectively.

In an example scenario where an application is built to use PAM for authentication and the PAM subsystem is configured to authenticate users accessing local files (for example, /etc...

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $15.99/month. Cancel anytime}