10-24-2011
You may want to look at Samba and winbindd for this.
5 More Discussions You Might Find Interesting
1. Linux
Dear All,
How to configure a Redhat 9 client to windows 2003 server. I have windows 2003 server which act has domain controller in my office. I have been asked to use redhat 9 has client. how to configure so that redhat 9 can authenticate with windows 2003 server .I have username created in... (0 Replies)
Discussion started by: solaris8in
0 Replies
2. Solaris
Hello all,
I heard that we can use Solaris to authenticate user with Active Directory. However, I do not see the point why we need to do that?? what's the benefit to authenticate user with Active Directory???
Example,
I have Solaris and I limited only 10 users can access Solaris production... (1 Reply)
Discussion started by: Smith
1 Replies
3. SCO
Hi all.
I'm having real trouble authenticating users against active directory for my SCO UnixWare 7.1.4 box running samba 3.0.24 (installed via Maintenance pack 4). I can list AD users/groups (after overcoming several hiccups) with wbinfo -g / wbinfo -u. I can use id to get a view an ad user ie:... (0 Replies)
Discussion started by: silk600
0 Replies
4. Solaris
Hi All, We are using solaris samba server for our company project to provide access to code to our development team.Recently our ICT has disabled wins service on Active directory due which user are not able to connect to samba share and they are getting error "No logon server available" as samba... (2 Replies)
Discussion started by: sahil_shine
2 Replies
5. UNIX for Dummies Questions & Answers
I want to connect via SSH that will authenticate via active directory (domain controller). For example my network login in my workstation is user123/123user under a domain. I wanted to use this details to login via ssh. In this way I don't have to add and create username everytime in the server... (1 Reply)
Discussion started by: lhareigh890
1 Replies
LEARN ABOUT REDHAT
pam_authenticate
PAM_AUTHENTICATE(3) App. Programmers' Manual PAM_AUTHENTICATE(3)
NAME
pam_authenticate - authenticate a user
SYNOPSIS
#include <security/pam_appl.h>
int pam_authenticate(pam_handle_t *pamh, int flags);
DESCRIPTION
pam_authenticate
Use this function to authenticate an applicant user. It is linked dynamically to the authentication modules by Linux-PAM. It is the task
of these module to perform such an authentication. The specific nature of the authentication is not the concern of the application.
Following successful completion, the name of the authenticated user will be present in the Linux-PAM item PAM_USER. This item may be
recovered with a call to pam_get_item(3).
The application developer should note that the modules may request that the user enter their username via the conversation mechanism (see
pam_start(3)). Should this be the case, the user-prompt string can be set via the PAM_USER_PROMPT item (see pam_set_item(3)).
RETURN VALUE
On success PAM_SUCCESS is returned. All other returns should be considered authentication failures and will be delayed by an amount speci-
fied with prior calls to pam_fail_delay(3). Specific failures that demand special attention are the following:
PAM_ABORT
the application should exit immediately. Of course, pam_end(3) should be called first.
PAM_MAXTRIES
the application has tried too many times to authenticate the user, authentication should not be attempted again.
ERRORS
May be translated to text with pam_strerror(3).
CONFORMING TO
DCE-RFC 86.0, October 1995.
BUGS
none known.
SEE ALSO
pam_start(3), pam_get_item(3) pam_fail_delay(3) and pam_strerror(3).
Also, see the three Linux-PAM Guides, for System administrators, module developers, and application developers.
Linux-PAM 0.55 1996 Dec 9 PAM_AUTHENTICATE(3)