Chapter 6. Authentication

Table of Contents

Ownership
User account
User definition
Group definition
Resetting Linux passwords
Resetting Windows Passwords
Working with different computers
Commands and behavior
Administrator
Sudo
Login
PAM
PAM applications
PAM modules
PAM configuration files
How it fits together
PAM Examples
Gnupg
Keys
Key servers
Getting public keys
Produce your keys
Modifying keys
Cryptographic signature
Encryption and decryption
Gui tools
Gpg Agent
Network Information Service

This chapter is really a pain for me and mostly the source when I having problems with Linux. But on the other hand it restrict system access to unexpected visitors as expected.

As general rule: When running in troubles, check if it works as root, if so then it is an authentication problem.


Linurs Hosttech startpage