In part 1 of this blog series, we talked about centralized authentication in Linux and covered some basic use cases. Part 2 discussed System Security Services Daemon (SSSD) and why it’s becoming so important to centralized authentication in the Linux space. In part 3, our final post in the series, we’ll discuss authorization and different […]
In part 1 of this blog series, we talked about centralized authentication in Linux and covered some basic use cases. In today’s post, we want to talk about System Security Services Daemon (SSSD) and why it’s becoming so important to centralized authentication in the Linux space. But first, we will touch upon Pluggable Authentication Module […]
Linux is, without a doubt, one of the most used server operating systems in the world. It is flexible, powerful, and many times the solutions derived from Linux-based applications are as good as their commercial, and proprietary, counterparts. Linux does have challenges that start from the very moment a user of the host attempts to […]