Sponsored Content
Top Forums UNIX for Advanced & Expert Users Windows AD users authenticate to Linux Post 302998547 by Vit0_Corleone on Saturday 3rd of June 2017 12:39:29 PM
Old 06-03-2017
Windows AD users authenticate to Linux

Hello folks, Please advise me what is the best way to authenticate Windows AD users against Linux machines.

Currently I am going to take a look of Vintela Authentication Services and please let me know if you have experience with VIntela.
Thanks in advance
 

7 More Discussions You Might Find Interesting

1. UNIX for Dummies Questions & Answers

UNIX help for Windows users?

Is there any sort of documentation that translates windows commands into linux commands? ...just the basic stuff that you would do on your win PC translated to linux? For example in windows to configure your network card you would... Settings > Control Panel > Network Connections > Local... (3 Replies)
Discussion started by: TINO
3 Replies

2. AIX

Authenticate AIX users from MS Active Directory

First, let me start off saying this is not spam. This is me trying to help out other AIX Admins with MS AD servers. If it is not applicable to you, someone else will find it useful. As long as the "KDC" service is running on your AD server, these steps should work. There should be no... (3 Replies)
Discussion started by: kah00na
3 Replies

3. Linux

Using squid_db_auth to authenticate squid users against SQLite

Hi guys, Can we use squid_db_auth to authenticate squid users against SQLite database? I googled but all configurations are in MySQL. (0 Replies)
Discussion started by: majid.merkava
0 Replies

4. IP Networking

Linux Client To Authenticate using TACACS

I have customer who controls access to the internet via TACACS server, basically a PIX firewall uses authentication from the TACACS to say if traffic is allowed to pass out of the gateway. I can't find anything on how to configure a linux client of TACACS authentication only how to set up a linux... (1 Reply)
Discussion started by: metallica1973
1 Replies

5. Proxy Server

Solaris 11.1 login authenticate with windows active directory

Hi, is that possible to login to solaris 11.1 authenticate with windows active directory? the user id is created in the windows active directory. Environment: Solaris 11.1 Windows 2012 Active Directory (3 Replies)
Discussion started by: freshmeat
3 Replies

6. AIX

AIX LDAP client authenticate against Linux Openldap server over TLS/SSL

Hi folks, How can i configure an AIX LDAP client to authenticate against an Linux Openldap server over TLS/SSL? It works like a charm without TLS/SSL. i would like to have SSL encrypted communication for ldap (secldapclntd) and ldapsearch etc. while accepting every kind of certificate/CA.... (6 Replies)
Discussion started by: paco699
6 Replies

7. UNIX for Beginners Questions & Answers

Seen Windows pc, having all the features of Linux, could exe, read and edit save like windows

Hi, totally new to linux base using windows when started learning and using computers. but i remember that one pc was there , look alike windows desktop, but could not do the task as windows just click and open and view edit etc. But, you could do a little differently even saving in and opening... (8 Replies)
Discussion started by: jraju
8 Replies
PAM_AUTHENTICATE(3)					     App. Programmers' Manual					       PAM_AUTHENTICATE(3)

NAME
pam_authenticate - authenticate a user SYNOPSIS
#include <security/pam_appl.h> int pam_authenticate(pam_handle_t *pamh, int flags); DESCRIPTION
pam_authenticate Use this function to authenticate an applicant user. It is linked dynamically to the authentication modules by Linux-PAM. It is the task of these module to perform such an authentication. The specific nature of the authentication is not the concern of the application. Following successful completion, the name of the authenticated user will be present in the Linux-PAM item PAM_USER. This item may be recovered with a call to pam_get_item(3). The application developer should note that the modules may request that the user enter their username via the conversation mechanism (see pam_start(3)). Should this be the case, the user-prompt string can be set via the PAM_USER_PROMPT item (see pam_set_item(3)). RETURN VALUE
On success PAM_SUCCESS is returned. All other returns should be considered authentication failures and will be delayed by an amount speci- fied with prior calls to pam_fail_delay(3). Specific failures that demand special attention are the following: PAM_ABORT the application should exit immediately. Of course, pam_end(3) should be called first. PAM_MAXTRIES the application has tried too many times to authenticate the user, authentication should not be attempted again. ERRORS
May be translated to text with pam_strerror(3). CONFORMING TO
DCE-RFC 86.0, October 1995. BUGS
none known. SEE ALSO
pam_start(3), pam_get_item(3) pam_fail_delay(3) and pam_strerror(3). Also, see the three Linux-PAM Guides, for System administrators, module developers, and application developers. Linux-PAM 0.55 1996 Dec 9 PAM_AUTHENTICATE(3)
All times are GMT -4. The time now is 12:37 PM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy