Authentication
341
32.6. Authentication
Figure 32.9. Authentication
In the
Authentication
section, select whether to use shadow passwords and MD5 encryption for user
passwords. These options are highly recommended and chosen by default.
The
Authentication Configuration
options allow you to configure the following methods of
authentication:
• NIS
• LDAP
• Kerberos 5
• Hesiod
• SMB
• Name Switch Cache
These methods are not enabled by default. To enable one or more of these methods, click the
appropriate tab, click the checkbox next to
Enable
, and enter the appropriate information for the
authentication method. Refer to the Red Hat Enterprise Linux Deployment Guide for more information
about the options.
32.7. Firewall Configuration
The
Firewall Configuration
window is similar to the screen in the installation program and the
Security Level Configuration Tool
.
Summary of Contents for ENTERPRISE LINUX 5 - VIRTUAL SERVER ADMINISTRATION
Page 12: ...xii ...
Page 20: ......
Page 30: ...12 ...
Page 32: ...14 ...
Page 82: ...64 ...
Page 106: ...88 ...
Page 122: ...104 ...
Page 124: ...106 ...
Page 126: ......
Page 132: ...114 ...
Page 168: ...150 ...
Page 182: ...164 ...
Page 192: ...174 ...
Page 194: ......
Page 236: ...218 ...
Page 238: ...220 ...
Page 270: ......
Page 274: ...256 ...
Page 278: ...260 ...
Page 292: ...274 ...
Page 294: ......
Page 300: ...282 ...
Page 304: ......
Page 316: ...298 ...
Page 370: ...352 ...
Page 384: ...366 ...
Page 385: ...Part VII Appendix ...
Page 386: ......