Re: pam and other authentication methods

2003-09-29 Thread David Z Maze
Benedict Verheyen <[EMAIL PROTECTED]> writes: > Op zo 28-09-2003, om 00:45 schreef David Z Maze: > >> I think both Kerberos and RADIUS are "single sign-on" protocols: when >> you log on you get some sort of authentication token, which you can >> use to talk to other services without typing a passw

Re: pam and other authentication methods

2003-09-29 Thread David Z Maze
Bijan Soleymani <[EMAIL PROTECTED]> writes: > I think another possible way would be through the C library. I believe > that the C library has certain authentication functions (I think for > passwd file and NIS). I think that you could modify these functions to > provide whichever method you want.

Re: pam and other authentication methods

2003-09-28 Thread Bijan Soleymani
On Sat, Sep 27, 2003 at 04:58:50PM +0200, Benedict Verheyen wrote: > Today i read that Slackware doesn't use PAM by default because of some > of the leaks that pop up now and then. I was wondering what other type > of authentications there are on Linux and how easy/difficult they are to > set up.

Re: pam and other authentication methods

2003-09-28 Thread Benedict Verheyen
Op zo 28-09-2003, om 00:45 schreef David Z Maze: > I think both Kerberos and RADIUS are "single sign-on" protocols: when > you log on you get some sort of authentication token, which you can > use to talk to other services without typing a password. I know much > more about Kerberos, so I'll tal

Re: pam and other authentication methods

2003-09-27 Thread Roberto Sanchez
David Z Maze wrote: Benedict Verheyen <[EMAIL PROTECTED]> writes: Today i read that Slackware doesn't use PAM by default because of some of the leaks that pop up now and then. I was wondering what other type of authentications there are on Linux and how easy/difficult they are to set up. The ba

Re: pam and other authentication methods

2003-09-27 Thread David Z Maze
Benedict Verheyen <[EMAIL PROTECTED]> writes: > Today i read that Slackware doesn't use PAM by default because of > some of the leaks that pop up now and then. I was wondering what > other type of authentications there are on Linux and how > easy/difficult they are to set up. The basic answer her