Quote:
|
Quote:
I'd say you're quite right about Slackware and NIS. I learned a lot about that from a previous thread in which we both participated, and recently I discovered that some rights/account management commands simply do not work on NIS-enabled Slackware. I haven't reported this as a bug (yet), and the fact that no-one else seems to have noticed speaks volumes about the current position of Slackware in the enterprise. |
Yes, but Slackware isn't a distribution geared at any specific usage or platform. Slackware is what you the system administrator make it out to be. Slackware gives you all the tools to give you a generalized foundation to build a system specific and customized for your usage needs. It offers nothing more or less, however you the administrator and deployer of said system is expected to know everything else you need to know to tune Slackware to fit your specific needs.
If you aren't capable of this, then you aren't ready enough to use Slackware for that purpose. As blunt as that sounds, it's the truth. |
Quote:
1. Setup centralized authentication using LDAP and NFS on a Slackware server and Slackware clients. 2. Write a detailed step-by-step documentation about the process. 3. Publish it on http://docs.slackware.com. 4. Eventually, maintain all the core packages that have to be rebuilt in the process. Thanks in advance, Niki |
Quote:
(Ridiculous, isn't it?) I am neither pro- nor anti-PAM inclusion but I fail to see how its inclusion somehow forces a specific usage. If anything, PAM's current exclusion forces less flexible authentication options onto all Slackware users. It would be easier to make a PAM-enabled installation act like existing Slackware than for every user to add PAM to their installations. |
Quote:
For now I trust Mr Volkerdings judgement. He excluded it for good reason, and if he takes another look at it I would be very interested in his results. But I dont have any need for it myself, so naturally I am more worried about any possible ill effects than in yet more features I dont need and will never intentionally use. |
Quote:
I've just downloaded and compiled libnss_ldap. I don't know what I would have to set up to test it. If you give me an idea of how to do that, I'll see if libnss_ldap works without PAM. |
Quote:
Why doesn't *that* work? |
Quote:
http://slackbuilds.org/repository/14...nss-pam-ldapd/ The only problem here is that there's no usable documentation on how to use that stuff. Only sparse/incomplete/wrong bits of information scattered around the Internet. Here's an example of what I would call "usable documentation": https://help.ubuntu.com/14.04/server...ap-server.html |
Quote:
Please go back to your LFS distro (which has literally written down every step you need to take to create a LFS computer from scratch, so that the amount of thinking can be kept to a minimum) and leave Slackware to us. Or else, prove that you know what we are talking about and write a comprehensive article on docs.slackware.com explaining how to setup a centralized authentication setup for Slackware using NIS/LDAP/NFS. Eric |
Unforgivable...
Quote:
In real life some tasks are less "romantic" than they seems to be as a hobbyist. https://www.youtube.com/watch?v=7lYVggyHRkY |
wow
anyway if my opinion matters, that it probably does not, PAM should not be added to slackware it looks like a framework made 'cuz companies could not agree on one standard (or two, one for files) |
Quote:
Naw... I don't use those so I don't feel the need to, not do I need to. You and kikinovak are both mature enough, at least I hope, so you or both of you can do it rather than point fingers at me crying foul. Otherwise, I'm done on this subject, so piss and moan about your ineptness without me. |
Quote:
|
Quote:
This way, you can use ldap, kerberos, etc... You can even use the good old reliable linux flat files (shadow, passwd, group). Just imagine having 50 computers. Now imagine that every user should be able to work on any one of them. To do this, you can: a) replicate passwd, shadow, group to every one of those computers... every time a user is created or changes their password... b) have some sort of central authentication scheme that the 50 computers use. If you are a sysadmin that has to deal with that, you will probably chose b) Now imagine 500 or 5000 computers... b) will look even more attractive :) Ser Olmy explained it best in this post: http://www.linuxquestions.org/questi...ml#post5209961 |
All times are GMT -5. The time now is 03:33 AM. |