Two Factor Authentication – Best for the UNIX/Linux Server Security


 
Thread Tools Search this Thread
Special Forums Cybersecurity Two Factor Authentication – Best for the UNIX/Linux Server Security
Prev   Next
# 1  
Old 05-28-2017
Two Factor Authentication – Best for the UNIX/Linux Server Security

The UNIX/Linux server security is challenging because these servers are at a risk of getting compromised at any point of time by the attackers. In today's enterprise environment, the UNIX and Linux servers are growing popular. With their increased popularity, these servers have become the primary target of the attackers for security breaches. There have been numerous cases of harmful external security threats where the attackers have gained access to these servers; UNIX and Linux, through the Internet. The largest security threat to UNIX/Linux server is internal, not external. Therefore, it is must for the enterprises to improve their UNIX/Linux server security, so that comprising server becomes complicated for the hackers.

What is your thinking..??
 
Login or Register to Ask a Question

Previous Thread | Next Thread

6 More Discussions You Might Find Interesting

1. Solaris

User authentication failed while log in Solaris 8 client on Linux NIS server.

Based on the NIS migration tests I did and another question I posted earlier on. https://www.unix.com/solaris/272021-solaris-8-md5-encryption-support.html I tried to downgrade NIS linux encryption to DES to support solaris connection. So I modified /etc/pam.d/system-auth as below, password... (0 Replies)
Discussion started by: bestard
0 Replies

2. Linux

Customized Linux Operating System with Security Authentication

Dear Gurus/Experts of UNIX/LINUX, Im Isravel from India, I've customized CentOS Installation ISO as per my new product requirements. I want to give serial key authentication to the clients who all are trying to install ISO file. Can anyone guide me how to create serial key authentication... (1 Reply)
Discussion started by: isravelraja
1 Replies

3. UNIX and Linux Applications

UNIX and Linux authentication middleware or tools

Hi, We are looking for UNIX and Linux authentication middleware/tools which can replace our existing RSA SecurID - Two-Factor Authentication. Any suggestions or recommendations. Thanks, Gabar (2 Replies)
Discussion started by: Gabar Singh
2 Replies

4. Linux

How to connect Linux server (configure two way authentication) with Windows server?

Hi my name is Manju. ->I have configure the two way authentication on my linux server. ->Now I am able to apply two way authenticator on particuler user. ->Now I want to map this linux server to my AD server. ->Kindly tell me how to map AD(Active Directory) with this linux server. ... (0 Replies)
Discussion started by: manjusharma128
0 Replies

5. HP-UX

Multi-factor authentication

Is anyone here familiar with implementing multi-factor authentication on HP-UX 11.31? Either with a PIV card, or with an RSA token? We've been tasked with implementing this on our servers, but I'm not finding much in the way of products or information. To complicate matters, our servers are... (6 Replies)
Discussion started by: lupin..the..3rd
6 Replies

6. Red Hat

microsoft Server 2008 Active authentication to a linux server

Hi, Please could someone advise I'm trying to use winscp from a Window server 2008 R2, but i need to add the authentication key to access the linux rh 5.4 servers ? What is the best way of approaching this ? If there are any web links that could help me do this, that would be good. ... (1 Reply)
Discussion started by: venhart
1 Replies
Login or Register to Ask a Question
gsscred(1M)															       gsscred(1M)

NAME
gsscred - add, remove and list gsscred table entries SYNOPSIS
user oid] uid]] comment] user oid]] uid] mech] user oid]] uid] mech] DESCRIPTION
The utility is used to create and maintain a mapping between a security principal name and a local UNIX uid. The format of the user name is assumed to be You can use the option to specify the object identifier of the name type. The OID must be specified in dot-separated notation, for example: The table is used on server machines to lookup the uid of incoming clients connected using When adding users, if no user name is specified, an entry is created in the table for each user from the passwd table. If no comment is specified, the utility inserts a comment that specifies the user name as an ASCII string and the GSS-API security mechanism that applies to it. The security mechanism will be in string representation as defined in the file. The parameters are interpreted the same way by the utility to delete users as they are to create users. At least one of the following options must be specified: or If no security mechanism is specified, then all entries will be deleted for the user identified by either the uid or user name. If only the security mechanism is specified, then all user entries for that security mechanism will be deleted. Again, the parameters are interpreted the same way by the utility to search for users as they are to create users. If no options are spec- ified, then the entire table is returned. If the user name or uid is specified, then all entries for that user are returned. If a secu- rity mechanism is specified, then all user entries for that security mechanism are returned. Options Add a table entry. Insert comment about this table entry. Search table for entry. Specify the mechanism for which this name is to be translated. Specify the optional principal name. Specify the OID indicating the name type of the user. Remove the entry from the table. Specify the uid for the user if the user is not local. EXAMPLES
Example 1: Creating a gsscred Table The following shows how to create a table for the Kerberos Security Mechanism(V5). obtains user names and uid's from the passwd table to populate the table. Example 2: Adding an Entry The following shows how to add an entry for with a specified uid of 0 for the Kerberos Security Mechanism(V5). Example 3: Listing All User Mappings The following lists all user mappings for the Kerberos Security Mechanism(V5). Example 4: Lising All Mappings for a Specified User The following lists all mappings for all security mechanisms for the user EXIT STATUS
The following exit values are returned: 0 Successful completion. >0 An error occurred. FILES
The mapping table. Tables of GSS-API based security mechanism installed. SEE ALSO
gssd(1M), gsscred_clean(1M). gsscred(1M)