
Contents
About This Guide
xi
1 Security and Confidentiality
1
1.1
Local Security and Network Security . . . . . . . . . . . . . . . . .
2
1.2
Some General Security Tips and Tricks . . . . . . . . . . . . . . . .
11
1.3
Using the Central Security Reporting Address . . . . . . . . . . . . .
14
Part I
Authentication
15
2 Authentication with PAM
17
2.1
Structure of a PAM Configuration File . . . . . . . . . . . . . . . .
18
2.2
The PAM Configuration of sshd . . . . . . . . . . . . . . . . . . .
20
2.3
Configuration of PAM Modules . . . . . . . . . . . . . . . . . . .
22
2.4
Configuring PAM Using pam-config . . . . . . . . . . . . . . . . .
24
2.5
For More Information . . . . . . . . . . . . . . . . . . . . . . .
26
3 Using NIS
27
3.1
Configuring NIS Servers . . . . . . . . . . . . . . . . . . . . . .
27
3.2
Configuring NIS Clients . . . . . . . . . . . . . . . . . . . . . .
33
4 LDAP—A Directory Service
35
4.1
LDAP versus NIS . . . . . . . . . . . . . . . . . . . . . . . . .
36
4.2
Structure of an LDAP Directory Tree . . . . . . . . . . . . . . . . .
37
4.3
Configuring an LDAP Server with YaST . . . . . . . . . . . . . . . .
40
4.4
Configuring an LDAP Client with YaST . . . . . . . . . . . . . . . .
49
4.5
Configuring LDAP Users and Groups in YaST . . . . . . . . . . . . . .
57
Summary of Contents for LINUX ENTERPRISE DESKTOP 11
Page 1: ...SUSE Linux Enterprise Server www novell com 11 March 17 2009 Security Guide...
Page 9: ...32 7 Managing Audit Event Records Using Keys 433 33 Useful Resources 435...
Page 10: ......
Page 29: ...Part I Authentication...
Page 30: ......
Page 55: ...Figure 4 2 YaST LDAP Server Configuration LDAP A Directory Service 41...
Page 126: ......
Page 127: ...Part II Local Security...
Page 128: ......
Page 158: ......
Page 173: ...Part III Network Security...
Page 174: ......
Page 194: ......
Page 197: ...Figure 16 2 Scenario 2 Figure 16 3 Scenario 3 Configuring VPN Server 183...
Page 210: ......
Page 228: ......
Page 229: ...Part IV Confining Privileges with Novell AppArmor...
Page 230: ......
Page 274: ......
Page 300: ......
Page 328: ......
Page 340: ......
Page 342: ......
Page 386: ......
Page 387: ...Part V The Linux Audit Framework...
Page 388: ......