Techniques for managing user identities in Linux
Maybe password security isn't perfect, but most networks depend on it. This month we examine some tools for smarter, more versatile authentication.
Despite years of constant high-tech innovation, the password remains a fundamental feature of most networks. Various tools let you consolidate, encrypt, sanitize, and synchronize passwords, but unless your company invests heavily in smart cards or other new age technologies, you'll eventually have to log in somewhere. This month we look at some techniques for supporting, securing, and simplifying user authentication in Linux.
Our first article examines some tools for authenticating users with one-time passwords. You'll learn why many organizations prefer passwords that change with every login. We then zero in for a look at OPIE and OTPW – a pair of open source solutions for one-time password authentication.
Many Linux users would rather not even think about Microsoft, but part of our mission has always been to let readers know about free, open source tools for easy integration with proprietary technologies. Our next article describes how Samba's Windbind service lets Linux clients participate in Microsoft's Active Directory environments.
We'll also discuss some options for creating password-protected pages for your website. We'll look at how the Apache web server handles authentication, we'll examine authentication alternatives based on SQL and LDAP, we'll show you how to create a custom authentication solution in Perl.
The final article describes how to use the OpenID service as a single authentication system for multiple web accounts. Read on for more on some great techniques for managing user identities in Linux.
Buy this article as PDF
MSBuild is now just another GitHub project as Redmond continues its path to the light.
Malware could pass data and commands between disconnected computers without leaving a trace on the network.
New rules emphasize collegiality in coding.
Upstart lands in the dust bin as a new era begins for Linux.
HP's annual Cyber Risk report offers a bleak look at the state of IT.
But what do the big numbers really mean?
.NET Core execution engine is the basis for cross-platform .NET implementations.
The Xnote trojan hides itself on the target system and will launch a variety of attacks on command.
Spammers go low-volume, and 90% of IE browsers are unpatched.
Adobe scrambles to release patches for vulnerable Flash Player.