Sponsored Content
Top Forums UNIX for Dummies Questions & Answers UNIX Logon/Authentication Types Post 302960668 by urhero on Wednesday 18th of November 2015 10:12:07 AM
Old 11-18-2015
UNIX Logon/Authentication Types

Hi,

I was wondering if someone may be able to help me with finding out the different *nix logon types.

The different logon types for a Successful Logon event type in Windows (4624) is well documented both on the M$ site and also on many tech related sites, listing the different logon types and descriptions. [I tried to post a link but I'm not allowed yet - happy to supply one in the comments.]
(Sorry for using Windows as a comparison but it was an easy example.)

So far from our logging I have collected the following list of different logon types:
accepted keyboard-interactive
accepted keyboard-interactive/pam
accepted password
accepted publickey
login

This has been collected either from the messages or the auth logs with an example below:
Code:
[DATE] [TIME] [serverName] sshd[5698]: Accepted keyboard-interactive for [user] from [Address] port 64967 ssh2

I have managed to find info for most of them (I believe 'login' is to do with an issue in our logging), but I am asking if there are any other login/auth types that I haven't listed?
If so, would you please be able to link me to a page so that I can grab a description the type?

I'm not interested in the different methods, unless they'd appear in the auth logs as 'Accepted LDAP interactive', or similar.

Please let me know if you'd like any clarification on the question.

Thanks in advance.

Last edited by urhero; 11-18-2015 at 12:06 PM..
 

9 More Discussions You Might Find Interesting

1. UNIX for Dummies Questions & Answers

What all Unix types can be installed on PC?

I would like to know as what all Unix types can be installed on PC, i.e. Intel Pentium processor and having HDD of let us say 4 GB or so? What RAM would be sufficient? I know for sure that Linux is free and can be installed on PC, can some one tell about other UNIX types which can be obtained for... (3 Replies)
Discussion started by: SANJAY
3 Replies

2. UNIX for Dummies Questions & Answers

What file types does unix support?

Hello, I've search this site many times and ave not been able to find my answer. So I'm going to post my question....(duh) Ok. I'm wanting to know what file types does unix support. if you can try and list them like this: php, .php or somthing like that. plus don't forget that I said I... (3 Replies)
Discussion started by: dgames
3 Replies

3. UNIX for Dummies Questions & Answers

UNIX logon script/batch

Hi everyone, I am a newbies to Unix and hope someone can help me on: 1. Do anyone has batch file example that can be logon to a unix sever through telnet and exec a nohup command without typing in username and passward everytime ? 2. A java script exmaple for doing the same logon so it... (1 Reply)
Discussion started by: oht
1 Replies

4. Windows & DOS: Issues & Discussions

Windows AD for Unix authentication

I am not an expert in Unix at all. My knowledge of Unix is average. We have a couple of Unix servers, Solaris and Linux, which run mostly web servers, and Oracle databases. Currently users have multiple user IDs for Unix and AD applications. Is it possible to make use of the Windows Active... (2 Replies)
Discussion started by: speriya
2 Replies

5. Solaris

Identify which authentication method was used at logon

Experts, Is there any way to know which authentication method the user used to login into the box? I mean, is possible to identify if an active user had logged using keys or password for example? Let me clarify: we have a script that we want to allow users to execute only if they have used... (2 Replies)
Discussion started by: fmattos
2 Replies

6. Solaris

bypass password authentication for sftp in unix

I am using solaris unix 8.2 version. I want to bypass password authentication for sftp. Can you please give some ideas on this. thanks.Regards. (4 Replies)
Discussion started by: vijill
4 Replies

7. Shell Programming and Scripting

Get all types of shell supported on any unix flavors.

Hello - Is there a command/way we can find out, what shells are supported on a Unix machine? Please let me know. Thanks, Manju (3 Replies)
Discussion started by: manju--
3 Replies

8. AIX

UNIX authentication strategy - LDAP or AD

We are looking at using Tivoli Directory Server (LDAP) or Active Directory 2003 for authentication. I wanted to get some feedback from the community. Our goal is to do it the simplest, easiest, and cheapest way that allows for centralized user authentication. We are mainly an AIX environment with... (3 Replies)
Discussion started by: x96riley3
3 Replies

9. Shell Programming and Scripting

Secondary Authentication of UNIX .

Hi All, My Servers are enabled with a secondary authentication of login. Whenever we are logging in to the servers with a common id it is asking like something " Enet your personal id and password" which has been created by UNIX admins previously. Just curious how to achieve this... (1 Reply)
Discussion started by: Showdown
1 Replies
CALIFE(1)						    BSD General Commands Manual 						 CALIFE(1)

NAME
calife -- becomes root (or another user) legally. SYNOPSIS
calife [-] [login] or ... [-] [login] for some sites (check with your administrator). DESCRIPTION
Calife requests user's own password for becoming login (or root, if no login is provided), and switches to that user and group ID after veri- fying proper rights to do so. A shell is then executed. If calife is executed by root, no password is requested and a shell with the appro- priate user ID is executed. The invoked shell is the user's own except when a shell is specified in the configuration file calife.auth. If ``-'' is specified on the command line, user's profile files are read as if it was a login shell. This is not the traditional behavior of su. Only users specified in calife.auth can use calife to become another one with this method. You can specify in the calife.auth file the list of logins allowed for users when using calife. See calife.auth(5) for more details. calife.auth is installed as /etc/calife.auth. FILES
/etc/calife.auth List of users authorized to use calife and the users they can become. /etc/calife.out This script is executed just after getting out of calife. SEE ALSO
su(1), calife.auth(5), group(5), environ(7) ENVIRONMENT
The original environment is kept. This is not a security problem as you have to be yourself at login (i.e. it does not have the same security implications as in su(1) ). Environment variables used by calife: HOME Default home directory of real user ID. PATH Default search path of real user ID unless modified as specified above. TERM Provides terminal type which may be retained for the substituted user ID. USER The user ID is always the effective ID (the target user ID) after an su unless the user ID is 0 (root). BUGS
The MD5-based crypt(3) function is slower and probably stronger than the DES-based one but it is usable only among FreeBSD 2.0+ systems. HISTORY
A calife command appeared in DG/UX, written for Antenne 2 in 1991. It has evolved considerably since this period with more OS support, user lists handling and improved logging. PAM support was introduced in 2005 to port it to MacOS X variants (Panther and up). AUTHOR
Ollivier Robert <roberto@keltia.freenix.fr> BSD
September 25, 1994 BSD
All times are GMT -4. The time now is 05:21 PM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy