7 More Discussions You Might Find Interesting
1. UNIX for Advanced & Expert Users
Hello folks, Please advise me what is the best way to authenticate Windows AD users against Linux machines.
Currently I am going to take a look of Vintela Authentication Services and please let me know if you have experience with VIntela.
Thanks in advance (1 Reply)
Discussion started by: Vit0_Corleone
2. IP Networking
I have a pretty useless satellite link at home (far from any civilization), so I wanted to set up caching in order to speed things up. My Squid 2.6 runs "3128 transparent" and is set up quite well on a separate machine.
I also have my dd-wrt router to move all port 80 traffic through... (0 Replies)
Discussion started by: theWojtek
First, let me start off saying this is not spam. This is me trying to help out other AIX Admins with MS AD servers. If it is not applicable to you, someone else will find it useful.
As long as the "KDC" service is running on your AD server, these steps should work. There should be no... (3 Replies)
Discussion started by: kah00na
4. Shell Programming and Scripting
I have a requirement that requires me to fill an sqlite database with 100,000 entries (no duplicates).
I will start out by giving the command that will insert the values necessary to populate the database:
# sqlite /var/local/database/dblist "insert into list... (2 Replies)
Discussion started by: ogoy
5. Shell Programming and Scripting
I am trying to write a Perl script that is using 'SQLite' as the application needs a very light weight Database. I wanted to know how to catch exceptions when I run queries in SQLite. Without this the Perl script comes to a halt everytime an exception occurs. Please help.
Regards,... (4 Replies)
Discussion started by: garric
We have a cgi application which accesses sqlite database. It works fine in Linux environment but the same code doesn't enter data into the database when done in HP-UX environment. Should the codes vary depending on whether it is Linux or HP-UX.
Ruma (1 Reply)
Discussion started by: perlprg
7. UNIX for Dummies Questions & Answers
i'm on freebsd 5.2.1, and from a fresh installation i've used pkg_add for the latest ported version of apache, as well as installing php 5. supposedly php5 comes with native support for sqlite (in the binary package), and this is what i added.
i am trying to install a site engine (the 'gyrator'... (0 Replies)
Discussion started by: brandan
pam_auth(8) System Manager's Manual pam_auth(8)
pam_auth - Squid PAM authentication helper
squid_pam_auth [-n "service name"] [-t TTL] [-o] [-1]
This helper allows Squid to connect to a mostly any available PAM database to validate the user name and password of Basic HTTP authentica-
Specifies the PAM service name Squid uses, defaults to "squid"
-t TTL Enables persistent PAM connections where the connection to the PAM database is kept open and reused for new logins. The TTL speci-
fies how long the connection will be kept open (in seconds). Default is to not keep PAM connections open. Please note that the use
of persistent PAM connections is slightly outside the PAM specification and may not work with all PAM configurations.
-o Do not perform the PAM account management group (account expiration etc)
The program needs a PAM service to be configured in /etc/pam.conf or /etc/pam.d/<servicename>
The default service name is "squid", and the program makes use of the 'auth' and 'account' management groups to verify the password and the
For details on how to configure PAM services, see the PAM documentation for your system. This manual does not cover PAM configuration
When used for authenticating to local UNIX shadow password databases the program must be running as root or else it won't have sufficient
permissions to access the user password database. Such use of this program is not recommended, but if you absolutely need to then make the
program setuid root
chown root pam_auth
chmod u+s pam_auth
Please note that in such configurations it is also strongly recommended that the program is moved into a directory where normal users can-
not access it, as this mode of operation will allow any local user to brute-force other users passwords. Also note the program has not been
fully audited and the author cannot be held responsible for any security issues due to such installations.
Squid pam_auth and this manual is written by Henrik Nordstrom <email@example.com>
Squid pam_auth and this manual is Copyright 1999,2002,2003 Henrik Nordstrom <firstname.lastname@example.org>
Questions on the usage of this program can be sent to the Squid Users <email@example.com> mailing list.
Report bugs or bug-fixes to Squid Bugs <firstname.lastname@example.org> or ideas for new improvements to Squid Developers <squid-dev@squid-
pam(8), PAM Systems Administrator Guide
Squid PAM Auth 5 Sep 2003 pam_auth(8)