05-04-2012
Working! Possible solution: Try to put those auth lines at the beginning of the config file.
10 More Discussions You Might Find Interesting
1. Linux
postfix configuration issues...specifically masquerading (lack of )
Mail sent to our intranet arrives correctly (me@domain.com).
Mail sent to our intranet arrives correctly (me@domain.com).
Anything going outside does not, so my tests get rejected (me@hostname.com) :(
any assistance... (5 Replies)
Discussion started by: mr_manny
5 Replies
2. UNIX for Dummies Questions & Answers
I have squid version 2.6 running on ubuntu linux as a proxycache although caching is not being used, the problem I have is that certain websites that require the user to log into do not seem to pass through the squid, the only thing I see is that the website is trying to access a file called... (1 Reply)
Discussion started by: Simon Young
1 Replies
3. Solaris
hi all
i am a newbie to solaris and i am doing some R&D in veritas volume manager. This is my first day with veritas. I downloaded and installed Veritas storage foundation 5.1 package in my sun solaris 5.10 sparc machine. When i try to create disk group in vxvm, it giving one error message. I am... (6 Replies)
Discussion started by: kingston
6 Replies
4. UNIX for Dummies Questions & Answers
I am trying to configure my squid to block access to certain websites facebook and twitter in this case.
After defining my acls and the corresponding http_access lines users are still able to access these websites.
I would also like to allow access to the proxy from 12:30 to 14:00 hrs only. I... (4 Replies)
Discussion started by: bryanmuts2000
4 Replies
5. IP Networking
Can any one direct me to the resources where I can find in-depth instructions on Squid Proxy server and its configuration?
Thanks in advance.:) (1 Reply)
Discussion started by: admin_xor
1 Replies
6. UNIX for Advanced & Expert Users
Hello all,
I am trying to configure squid proxy server for different organizations. These organizations will have different blocked ports, different acls, etc. But, I can use only one proxy server for this purpose. Thinking of making a shell script with iptables and squid.
For an example: a... (1 Reply)
Discussion started by: admin_xor
1 Replies
7. IP Networking
Hello,
I have a pretty useless satellite link at home (far from any civilization), so I wanted to set up caching in order to speed things up. My Squid 2.6 runs "3128 transparent" and is set up quite well on a separate machine.
I also have my dd-wrt router to move all port 80 traffic through... (0 Replies)
Discussion started by: theWojtek
0 Replies
8. UNIX and Linux Applications
Hello,
I have been trying to setup the following squid configuration http://veloso.org/SquidConfig/SquidConfig.html
but every time I get to start squid I get the following error-
2012/05/28 10:31:12| WARNING: redirector #1 (FD 7) exited
2012/05/28 10:31:12| WARNING: redirector #2 (FD 9)... (2 Replies)
Discussion started by: jamie_123
2 Replies
9. UNIX for Dummies Questions & Answers
Hi everyone!
Hope all of you will be fine. I am new to this forum.
Well, I am trying to configure yaml-0.1.4 in cygwin on Windows 7.
I have written the following command:
*******/tmp/yaml-0.1.4
$ ./configure --prefix=/usr && make && make install
and the following error appeared.
... (3 Replies)
Discussion started by: imdalucky1
3 Replies
10. Linux
Hi
I have tried setting up of Apache http server - httpd-2.4.25.
During configuration, I understand it needs APR to be setup. Hence I have downloaded APR & APR-Util.
Performed,
tar xvfC apr-1.5.2.tar /root/httpd-2.4.25/srclib/apr
What is happening is there is another directory... (1 Reply)
Discussion started by: videsh77
1 Replies
LEARN ABOUT CENTOS
fingerprint-auth
SYSTEM-AUTH(5) Linux-PAM Manual SYSTEM-AUTH(5)
NAME
system-auth - Common configuration file for PAMified services
SYNOPSIS
/etc/pam.d/system-auth /etc/pam.d/password-auth /etc/pam.d/fingerprint-auth /etc/pam.d/smartcard-auth
DESCRIPTION
The purpose of these configuration files are to provide a common interface for all applications and service daemons calling into the PAM
library.
The system-auth configuration file is included from nearly all individual service configuration files with the help of the substack direc-
tive.
The password-auth fingerprint-auth smartcard-auth configuration files are for applications which handle authentication from different types
of devices via simultaneously running individual conversations instead of one aggregate conversation.
NOTES
Previously these common configuration files were included with the help of the include directive. This limited the use of the different
action types of modules. With the use of substack directive to include these common configuration files this limitation no longer applies.
BUGS
None known.
SEE ALSO
pam(8), config-util(5), postlogin(5)
The three Linux-PAM Guides, for system administrators, module developers, and application developers.
Red Hat 2010 Dec 22 SYSTEM-AUTH(5)