[Date Prev] [Date Next] [Thread Prev] [Thread Next] [Date Index] [Thread Index]
> Can someone point me to any resourses on how to set up a server so that it has > to go to another server to authenticate a user login and still be able to use > its /etc/password, /etc/shadow files? Use Kerberos and/or RADIUS. Or NIS/YP over a (virtual) private network if the job is small. Be sure you use an implementation of NIS/YP which allows for MD5 shadowed passwords. -V. ______________________________________________________________________ Philadelphia Linux Users Group - http://www.phillylinux.org Announcements-http://lists.phillylinux.org/mail/listinfo/plug-announce General Discussion - http://lists.phillylinux.org/mail/listinfo/plug