systematic Kerberization
Matthew Miller
mattdm at mattdm.org
Wed May 12 02:44:03 UTC 2004
On Tue, May 11, 2004 at 08:10:30AM -0600, Stephen Smoogen wrote:
> The standard way I have seen it implemented on other versions of Linux
> (here and other large organizations) is that the central authentication
> is used first in the pam stack and if it fails/isnt available you get
> authorized against the local password db which if it works lets you in.
"Other versions" including Red Hat Linux up until it suddenly stopped
working circa version 7.3.
<https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=55193>
--
Matthew Miller mattdm at mattdm.org <http://www.mattdm.org/>
Boston University Linux ------> <http://linux.bu.edu/>
More information about the fedora-devel-list
mailing list