Sponsored Content
Top Forums UNIX for Advanced & Expert Users Radius authorization on Linux clients Post 302859929 by carpannav on Friday 4th of October 2013 08:07:08 AM
Old 10-04-2013
Radius authorization on Linux clients

Hello folks,

I was guessing if there is a way for configuring Radius authorization on Linux clients. My meaning is to make Radius server manage the authorization/permissions when executing any commnand on my linux servers.

Then, there's any way to configure this with Radius? can I also control who executes every command? or I can just control the authentication?

I hope someone can help.

Thank you so much.
 

7 More Discussions You Might Find Interesting

1. UNIX for Dummies Questions & Answers

IP details for Unix/Linux login clients?

Hi there, I am wondering if by logging in to a unix system, if it is possible to get the IP address of the machine I am connecting FROM. I know how I can do this using the name server, but is this possible without a host lookup?:confused: Thanks, -ghoti (15 Replies)
Discussion started by: ghoti
15 Replies

2. UNIX for Advanced & Expert Users

shh authorization problem

I have ssh setup on 2 boxes ( aix / linux ). building a batchjob i have made a plaintext key. I force the command in the authorized_keys file running from aix -> linux ssh -i ~/.ssh/batchkey user@remote works perfect but from linux -> aix it get the following debug1:... (1 Reply)
Discussion started by: progressdll
1 Replies

3. Filesystems, Disks and Memory

Backup apps for Windows server, linux clients?

Hi guys. What would you recommend me a software running on Windows, and it is capable for backing up Windows and Linux (unix is optional) machines? The application should have following features: - Encryption. - Authentication - Open source if possible :) ... I found Amanda, but it... (1 Reply)
Discussion started by: bsddaemon
1 Replies

4. AIX

LPAR and AIX VIO Disk Mappring for Linux Clients

VIO Server is managing both AIX Clients and Linux Clients. For AIX Clients, we could do a disk mapping from slot numbers to VIO and also uname -L to determine the lparid and serial number frame its running on. From a Linux Client, How do I know which IBM frame its running on? Any command to... (4 Replies)
Discussion started by: rpangulu
4 Replies

5. Red Hat

Dial-up PPPoE + Radius authentication in LINUX

Hi All, I am configured radius authentication server and PPPoE in my Linux systems. It is not work.. Kindly help me how to configure pppoe server to authenticate the clients via radius it is working in UNIX FreeBSD for the same not working in linux. Can you have any configuration... (0 Replies)
Discussion started by: thakshina
0 Replies

6. Red Hat

RADIUS server for SSH authorization

Good day to anyone. I need your help. I want to create a centralization server for authorization my users via SSH connections. My manager suggested me a RADIUS + PAM, but frankly speaking I read a lot information about these and understood one thing - RADIUS could work only with password... (0 Replies)
Discussion started by: jess_t03
0 Replies

7. BSD

problems with authorization via `xauth'

Dear all, I've got problems with X server authentication using `xauth'. The problem is, that I have my local computer running NetBSD 5.1 and a remote computer in LAN which is running Debian GNU Linux. During the login to my NetBSD computer `xdm' generates a magic cookie for my DISPLAY. Then I... (2 Replies)
Discussion started by: sidorenko
2 Replies
RADTEST(1)							Yard Radius Manual							RADTEST(1)

NAME
radtest - RADIUS server test program SYNOPSIS
radtest [ -afnrvx ] [ -d called_station_id ] [ -g calling_station_id ] [ -i id ] [ -p port ] [ -s secret ] [ -t type ] -u username pass- word DESCRIPTION
radtest is a program useful to test the configuration of a running RADIUS daemon. You need to add localhost to servers' authorized clients. This program is a client for authentication protocol only, it does not manage accounting packets currently. You could use it to test either the YARD RADIUS daemon or any other standard RADIUS server. OPTIONS
-a Sets accounting protocol on. Not yet implemented. -d called_station_id Sets the called station identifier for building packets. -f Sets user type to framed. This is overrided by -t option below. -g calling_station_id Sets the calling station identifier for building packets. -h Prints out usage of the command. -i id Sets the packet identifier to number `id'. -n Not yet implemented. -p port Uses udp port `port' instead of the value specified in /etc/services or the default one (1645). -r Not yet implemented. -s secret Specifies the secret key to use (default is localkey) -v Prints version information. -l file Changes the logging file. -x Prints (or should do so) debugging messages while compiling. FILES
/usr/conf/users This file contains the human readable information for users' accounting and authorization. See radius_attributes(5) for details about its syntax. /usr/conf/users.db The same of the previous one as compiled in by builddbm in GDBM format. It needs to be compiled again every time you make changes to the previous one and without restarting radiusd . /usr/conf/dictionary This read-only file contains the codes and formats for standard and vendor RADIUS protocol attributes and values along with their human readable representation. It is subject to change, due to new access server supports. It is a plain text file with a pletora of comments in it. SEE ALSO
radiusd(8), radlast(1), radlist(1), radtest(1), radwatch(1), radius_attributes(1), gdbm(3) COPYRIGHT
Copyright (C) 1992-1999 Lucent Inc. All rights reserved. Copyright (C) 1999-2004 Francesco Paolo Lovergine. All rights reserved. See the LICENSE file enclosed within this software for conditions of use and distribution. This is a pure ISO BSD Open Source License . NOTES
The syntax of the source users file is not described here. Please, refer to the official Livingston documentation, which includes the RADIUS for UNIX Administrator's Guide. 1.1 Aug 28, 2004 RADTEST(1)
All times are GMT -4. The time now is 02:42 PM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy