Proxy in Solaris 10


 
Thread Tools Search this Thread
Top Forums UNIX for Dummies Questions & Answers Proxy in Solaris 10
# 1  
Old 08-01-2007
Proxy in Solaris 10

Hi Gurus,
Is it possible to configure a Solaris Workstation to go out through ISA proxy server with authorization? I want to configure the X uptdate software to be able to make its updates through ISA proxy server but when i try to configure the proxy server and say OK its says that it cant connect to the proxy?? why is that? i am able to browse with mozila or firefox or whatever but im not able to get this Update software for solaris to work with the ISA proxy server? could you please help a little bit?

thank you very much indeed!
 
Login or Register to Ask a Question

Previous Thread | Next Thread

8 More Discussions You Might Find Interesting

1. IP Networking

Connecting via proxy chain to Upstream proxy

I need to configure a proxy on my local machine to use an upstream proxy (installed on another machine). The upstream proxy requires Digest/NTLM authorization. I want the local proxy to deal with the upstream proxy's authorization details and provides authorization free access to users that connect... (0 Replies)
Discussion started by: Russel
0 Replies

2. Linux

Proxy... through proxy ;)

ok, in my company i have a proxy that filter some url (yea, i know ;)) It was more then 7 year that i made a ssh tunnel with my linux machine, at work i used putty and redirect the internal squid proxy... it work very well! Yesterday the sysadmin has made a "content port filtering" and block... (0 Replies)
Discussion started by: zanac
0 Replies

3. Solaris

How to configure Proxy Server in Solaris 10 (X86)

Hi , I have installed solaris 10 on x 86 architecture. Now i want to configure this system as Proxy Server. I am new to the solaris. Please help me how can i configure this. Which packages or patches are needed ? or Which files have to be modify ? Please help me to resolve. Thanks and... (0 Replies)
Discussion started by: raviraj001
0 Replies

4. IP Networking

Software/tool to route an IP packet to proxy server and capture the Proxy reply as an

Hi, I am involved in a project on Debian. One of my requirement is to route an IP packet in my application to a proxy server and receive the reply from the proxy server as an IP packet. My application handles data at the IP frame level. My application creates an IP packet(with all the necessary... (0 Replies)
Discussion started by: Rajesh_BK
0 Replies

5. Shell Programming and Scripting

Help with proxy redirecting

Folks; i have a question about redirecting proxy in Apache2.2. I have a link for wiki called http://myserver.mmm.com I have a configuration script which redirect this link to http://myserver.mmm.com/wiki/dashboard I want to be able to extract "wiki" out of this link so it can be redirected... (0 Replies)
Discussion started by: moe2266
0 Replies

6. Solaris

Ftp Proxy Solaris 8

Hi All, I need help using the native Solaris 8 ftp client. I need to ftp through a ftp proxy. How would this be confiured on Solaris 8? Any help would be greatly appreciated. (0 Replies)
Discussion started by: cstovall
0 Replies

7. BSD

proxy or NAT

how do i configure proxy in freeBSD or NAT so that when i set it up as a server can connect other to my new gateway (0 Replies)
Discussion started by: AkinOkin
0 Replies

8. UNIX for Advanced & Expert Users

Proxy

Are there any decent proxy programs out there that will filter domains and forward them to specific ip addresses and ports? I'm looking for a proxy that can be configured to take a request, examine the domain it is going to and then forward it to be proxied through other machines on the network... (6 Replies)
Discussion started by: rado
6 Replies
Login or Register to Ask a Question
pam_user.conf(4)					     Kernel Interfaces Manual						  pam_user.conf(4)

NAME
pam_user.conf - user configuration file for pluggable authentication modules SYNOPSIS
DESCRIPTION
is the user configuration file for the Pluggable Authentication Module architecture, or PAM. It is not designed to replace the PAM system configuration file, For PAM to work properly, is mandatory (see pam.conf(4)). is optional. It is used only when a user basis configura- tion is needed. It mainly specifies options to be used by service modules on a user basis. The options defined in indicate the default for users who are not configured in or if the module type is not configured for some users. For the configuration in to take effect, needs to configure service module (see pam.conf(4)). Simplified pam_user.conf Configuration File The file contains a listing of login names. Each login name is paired with a corresponding service module with or without options speci- fied. Each entry has the following format: login_name module_type module_path options Below is an example of the configuration file. tom auth /usr/lib/security/$ISA/libpam_unix.so.1 debug use_psd tom auth /usr/lib/security/$ISA/libpam_dce.so.1 use_first_pass tom account /usr/lib/security/$ISA/libpam_unix.so.1 use_psd tom account /usr/lib/security/$ISA/libpam_dce.so.1 try_first_pass susan auth /usr/lib/security/$ISA/libpam_unix.so.1 susan auth /usr/lib/security/$ISA/libpam_dce.so.1 try_first_pass The login_name denotes the login name of a user (for example, For detailed information on module_type, module_path, and options, see pam.conf(4). The first entry indicates that when the UNIX authentication is invoked for the options and will be used. The second entry indicates that when the DCE authentication is invoked for the option will be used. The module type is not configured for therefore, the options will take effect. For those users who are not configured, the options apply. Notes If an error is found in an entry due to invalid login_name or module_type, then the entry is ignored. If there are no valid entries for the given module_type, the PAM framework ignores and reads the configuration in EXAMPLES
The following is a sample configuration file. Lines that begin with the symbol are treated as comments, and therefore ignored. # # PAM user configuration # # Authentication management john auth /usr/lib/security/$ISA/libpam_unix.so.1 john auth /usr/lib/security/$ISA/libpam_inhouse.so.1 try_first_pass david auth /usr/lib/security/$ISA/libpam_unix.so.1 use_psd david auth /usr/lib/security/$ISA/libpam_inhouse.so.1 try_first_pass susan auth /usr/lib/security/$ISA/libpam_unix.so.1 use_psd susan auth /usr/lib/security/$ISA/libpam_inhouse.so.1 try_first_pass # Password management john password /usr/lib/security/$ISA/libpam_unix.so.1 david password /usr/lib/security/$ISA/libpam_unix.so.1 use_psd susan password /usr/lib/security/$ISA/libpam_unix.so.1 use_psd SEE ALSO
pam(3), pam.conf(4). pam_user.conf(4)