02-11-2011
a network switch may, optionally, have a management interface. such an interface may use public/private keypairs for authentication. some switch-like network devices may also use authentication to restrict access to ports (often via the Radius protocol.)
10 More Discussions You Might Find Interesting
1. Shell Programming and Scripting
Hey all,
Just wanted to get some input on a script I am using to import files into a MySQL database.
The process is pretty simple: my main server exports these files and FTPs them. I have a script that FTPs them to the machine running that runs this script. The FTP script runs without issue... (2 Replies)
Discussion started by: billtwild
2 Replies
2. Shell Programming and Scripting
Hi,
I was using mpack to send mails using cronjob with attachments. It was working perfect. But recently it's behaving strangely. Its sending the mails without any error message but the mail is not getting delivered.
The code I was using:
/usr/local/bin/mpack -s "$SUBJECT" -d $MSGBODY... (0 Replies)
Discussion started by: itesh.dash
0 Replies
3. AIX
$cat /tmp/tuxob.lst
udi *****
jim 10
ant 19
ibm *****
$ input=`head -1 /tmp/tuxob.lst | awk '{print $NF}'`
$ echo $input
The output I am expecting is '*****'. But It is showing me the available files of current directory. When I run the command
head -1 /tmp/tuxob.lst | awk '{print $NF} ... (3 Replies)
Discussion started by: panchpan
3 Replies
4. Emergency UNIX and Linux Support
File: A.h
class A
{
public:
struct x X;
int show()
{
x.member_variable ? 0: -1;
}
};
Now if A.cpp is complied which includes A.h (which is actually in a huge project space) we see that x.member_variable value is not as expected. But if remove the show() method and place... (4 Replies)
Discussion started by: uunniixx
4 Replies
5. Shell Programming and Scripting
I notice that su - user (note with dash) brings in more of the user's environment than does su - user -c 'command'. For example, if root does an su - user, and types "umask" to the prompt, one umask is displayed; yet, if instead the command is su - user -c 'umask', the value is different. I thought... (2 Replies)
Discussion started by: drokerm
2 Replies
6. Shell Programming and Scripting
Hi,
i have script called script.ksh
script.ksh
---------
echo "Narayana" >$HOME/script.log
echo "$0" |sed 's/.ksh//' >>$HOME/script.log
My question is:
--------------
when iam executing on the prompt it is giving good results what we have expected...
example on the prompt:... (4 Replies)
Discussion started by: lnviyyapu
4 Replies
7. IP Networking
I want to know potential problems with the following scenario OR if it is an ok way to have my network setup:
I have 2 WAN connections to the internet. I have each WAN connection plugged into its own router. Router DD-WRT is gateway for servers (192.0.10.50). Router Tomato is gateway for pc's... (1 Reply)
Discussion started by: herot
1 Replies
8. Shell Programming and Scripting
Heyas
I'm currently attempting to apply the code of tui-select to tui-list.
That is because tui-list simply made a 1 string list, while tui-select uses dynamicly up to 3 strings per line.
Anyway, so i copy pasted the code, and just made the changes marked with red....
Know that both scripts... (2 Replies)
Discussion started by: sea
2 Replies
9. Solaris
hello, I have a problem when configuring the network at the LDOM level, on a SPARC-Enterprise-T5120 machine
The network goes through VLAN 503 (level, network tagget)
And I need to give network to the guest domain: madarrwebsol10
I hope someone can bring some light ....
Excuse my English ...
... (4 Replies)
Discussion started by: Wittman
4 Replies
10. UNIX for Beginners Questions & Answers
Our application fails to run successfully on Solaris 11. The same works fine in Solaris 10.
Due to which we are unable to migrate to Solaris 11. The app basically involves forking a child process, which finally connects with parent process. But on Solaris 11, it is unable to connect with parent... (0 Replies)
Discussion started by: wini008
0 Replies
LEARN ABOUT PLAN9
pam_sm_authenticate
PAM_SM_AUTHENTICATE(3) Linux-PAM Manual PAM_SM_AUTHENTICATE(3)
NAME
pam_sm_authenticate - PAM service function for user authentication
SYNOPSIS
#define PAM_SM_AUTH
#include <security/pam_modules.h>
PAM_EXTERN int pam_sm_authenticate(pam_handle_t *pamh, int flags, int argc, const char **argv);
DESCRIPTION
The pam_sm_authenticate function is the service module's implementation of the pam_authenticate(3) interface.
This function performs the task of authenticating the user.
Valid flags, which may be logically OR'd with PAM_SILENT, are:
PAM_SILENT
Do not emit any messages.
PAM_DISALLOW_NULL_AUTHTOK
Return PAM_AUTH_ERR if the database of authentication tokens for this authentication mechanism has a NULL entry for the user. Without
this flag, such a NULL token will lead to a success without the user being prompted.
RETURN VALUES
PAM_AUTH_ERR
Authentication failure.
PAM_CRED_INSUFFICIENT
For some reason the application does not have sufficient credentials to authenticate the user.
PAM_AUTHINFO_UNAVAIL
The modules were not able to access the authentication information. This might be due to a network or hardware failure etc.
PAM_SUCCESS
The authentication token was successfully updated.
PAM_USER_UNKNOWN
The supplied username is not known to the authentication service.
PAM_MAXTRIES
One or more of the authentication modules has reached its limit of tries authenticating the user. Do not try again.
SEE ALSO
pam(3), pam_authenticate(3), pam_sm_setcred(3), pam_strerror(3), PAM(8)
Linux-PAM Manual 06/04/2011 PAM_SM_AUTHENTICATE(3)