
Contents
About This Guide
xi
1 Security and Confidentiality
1
1.1
Local Security and Network Security . . . . . . . . . . . . . . . . .
2
1.2
Some General Security Tips and Tricks . . . . . . . . . . . . . . . .
11
1.3
Using the Central Security Reporting Address . . . . . . . . . . . . .
14
Part I
Authentication
15
2 Authentication with PAM
17
2.1
Structure of a PAM Configuration File . . . . . . . . . . . . . . . .
18
2.2
The PAM Configuration of sshd . . . . . . . . . . . . . . . . . . .
20
2.3
Configuration of PAM Modules . . . . . . . . . . . . . . . . . . .
22
2.4
Configuring PAM Using pam-config . . . . . . . . . . . . . . . . .
24
2.5
For More Information . . . . . . . . . . . . . . . . . . . . . . .
26
3 Using NIS
27
3.1
Configuring NIS Servers . . . . . . . . . . . . . . . . . . . . . .
27
3.2
Configuring NIS Clients . . . . . . . . . . . . . . . . . . . . . .
33
4 LDAP—A Directory Service
35
4.1
LDAP versus NIS . . . . . . . . . . . . . . . . . . . . . . . . .
36
4.2
Structure of an LDAP Directory Tree . . . . . . . . . . . . . . . . .
37
4.3
Configuring an LDAP Server with YaST . . . . . . . . . . . . . . . .
40
4.4
Configuring an LDAP Client with YaST . . . . . . . . . . . . . . . .
49
4.5
Configuring LDAP Users and Groups in YaST . . . . . . . . . . . . . .
57
Содержание LINUX ENTERPRISE DESKTOP 11
Страница 1: ...SUSE Linux Enterprise Server www novell com 11 March 17 2009 Security Guide...
Страница 9: ...32 7 Managing Audit Event Records Using Keys 433 33 Useful Resources 435...
Страница 10: ......
Страница 29: ...Part I Authentication...
Страница 30: ......
Страница 55: ...Figure 4 2 YaST LDAP Server Configuration LDAP A Directory Service 41...
Страница 126: ......
Страница 127: ...Part II Local Security...
Страница 128: ......
Страница 158: ......
Страница 173: ...Part III Network Security...
Страница 174: ......
Страница 194: ......
Страница 197: ...Figure 16 2 Scenario 2 Figure 16 3 Scenario 3 Configuring VPN Server 183...
Страница 210: ......
Страница 228: ......
Страница 229: ...Part IV Confining Privileges with Novell AppArmor...
Страница 230: ......
Страница 274: ......
Страница 300: ......
Страница 328: ......
Страница 340: ......
Страница 342: ......
Страница 386: ......
Страница 387: ...Part V The Linux Audit Framework...
Страница 388: ......