12.07.2015 Views

Red Hat Enterprise Linux 5 Administration Unleashed

Red Hat Enterprise Linux 5 Administration Unleashed

Red Hat Enterprise Linux 5 Administration Unleashed

SHOW MORE
SHOW LESS
  • No tags were found...

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

288CHAPTER 12Identity ManagementCAUTIONMost changes take effect immediately after you click OK. The network servicesenabled are started and configured to start at boot time. If a service is alreadyenabled, but its settings are modified, the service is restarted with the new settings. Ifa service is disabled in the interface, the service is not always stopped immediatelyafter you click OK or configured not to start at boot time. Be sure to stop the serviceexplicitly and use chkconfig off to disable it at boot time.As shown in Figure 12.1, the NIS, LDAP, Hesiod, and Winbind network services are availablefor user information. Refer to their corresponding sections earlier in this chapter formore information about each of them. To retrieve user information from a remote server(such as the information displayed with the finger command), click theEnable check box next to the desired method or methods. Then, click the Configurebutton for the method. The required settings differ per support option. Enter therequested information for each one enabled. For example, after enabling NIS, enter theNIS domain and server to connect to.To configure a remote authentication method, go to the Authentication tab as shown inFigure 12.2. The Kerberos, LDAP, SmartCard, SMB (Samba), and Winbind network servicesare available for user authentication. Click the Enable check box next to the desiredsupport option. Then, click the Configure button for the method and enter the requestedinformation.FIGURE 12.2Authentication Configuration

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!