Accessing and Manipulating User Data on the Windows Server
Through Nautilus and Konqueror, users are able to access their Windows user data
and can edit, create, and delete files and folders on the Windows server. Users can
access their data without having to enter their password again and again.
Offline Authentication
Users are able to log in and access their local data on the Linux machine even if
they are offline (for example, using a laptop) or the AD server is unavailable for
other reasons.
Windows Password Change
This port of AD support in Linux enforces corporate password policies stored in
Active Directory. The display managers and console support password change
messages and accept your input. You can even use the Linux
passwd
command
to set Windows passwords.
Single-Sign-On through Kerberized Applications
Many applications of both desktops are Kerberos-enabled (kerberized), which
means they can transparently handle authentication for the user without the need
for password reentry at Web servers, proxies, groupware applications, or other lo-
cations.
A brief technical background for most of these features is given in the following section.
5.2 Background Information for Linux
AD Support
Many system components need to interact flawlessly to integrate a Linux client into an
existing Windows Active Directory domain.
Figure 5.1, “Active Directory Authentication
Schema”
(page 69) highlights the most prominent ones. The following sections focus
on the underlying processes of the key events in AD server and client interaction.
68
Security Guide
Содержание LINUX ENTERPRISE DESKTOP 11
Страница 1: ...SUSE Linux Enterprise Server www novell com 11 March 17 2009 Security Guide...
Страница 9: ...32 7 Managing Audit Event Records Using Keys 433 33 Useful Resources 435...
Страница 10: ......
Страница 29: ...Part I Authentication...
Страница 30: ......
Страница 55: ...Figure 4 2 YaST LDAP Server Configuration LDAP A Directory Service 41...
Страница 126: ......
Страница 127: ...Part II Local Security...
Страница 128: ......
Страница 158: ......
Страница 173: ...Part III Network Security...
Страница 174: ......
Страница 194: ......
Страница 197: ...Figure 16 2 Scenario 2 Figure 16 3 Scenario 3 Configuring VPN Server 183...
Страница 210: ......
Страница 228: ......
Страница 229: ...Part IV Confining Privileges with Novell AppArmor...
Страница 230: ......
Страница 274: ......
Страница 300: ......
Страница 328: ......
Страница 340: ......
Страница 342: ......
Страница 386: ......
Страница 387: ...Part V The Linux Audit Framework...
Страница 388: ......