11.07.2015 Views

Administrator's Guide - Kerio Software Archive

Administrator's Guide - Kerio Software Archive

Administrator's Guide - Kerio Software Archive

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

7.7 Advanced7.7 AdvancedIn the Advanced tab you can set parameters for user authentication in the created domain:Figure 7.8Domain settings — parameters for users authenticationLinux PAMIn the <strong>Kerio</strong> Administration Console, this option is available only in installations for Linux.PAM (Pluggable Authentication Modules) are authentication modules that are able to authenticatethe user from a specific domain (e.g. company.com) against the Linux server onwhich <strong>Kerio</strong> MailServer is running. Use this option to specify the name of the PAM service(configuration file) used for authentication of users in this domain. The <strong>Kerio</strong> MailServerinstallation package includes a configuration file for the keriomail PAM service (it canbe found under /etc/pam.d/keriomail). It is strongly recommended to use the file. Detailsabout PAM service configuration can be found in the documentation to your Linuxdistribution.Kerberos 5Kerberos is an authorization and authentication protocol (for details, see information athttp://web.mit.edu/Kerberos/). <strong>Kerio</strong> MailServer uses this protocol to authenticateusers against the Kerberos server (e.g. in Active Directory).In the appropriate item of the dialog box, specify the Kerberos system domain, where theusers will be authenticated. Since <strong>Kerio</strong> MailServer 6.0.9, the name of the Kerberos realmmust be in capital letters.If user account are saved in Active Directory or in Open Directory (see the Directory Servicetab), it is required to specify name of the Active Directory or the Open Directory domain75

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!