Free Trial

Safari Books Online is a digital library providing on-demand subscription access to thousands of learning resources.


  • Create BookmarkCreate Bookmark
  • Create Note or TagCreate Note or Tag
  • PrintPrint
Share this Page URL
Help

8. Users and Groups > Password Encryption and User Authentication

Password Encryption and User Authentication

Some applications require that users authenticate themselves. Authentication typically takes the form of a username (login name) and password. An application may maintain its own database of usernames and passwords for this purpose. Sometimes, however, it is necessary or convenient to allow users to enter their standard username and password as defined in /etc/passwd and /etc/shadow. (For the remainder of this section, we assume a system where password shadowing is enabled, and thus that the encrypted password is stored in /etc/shadow.) Network applications that provide some form of login to a remote system, such as ssh and ftp, are typical examples of such programs. These applications must validate a username and password in the same way that the standard login program does.


  

You are currently reading a PREVIEW of this book.

                                                                                                                    

Get instant access to over $1 million worth of books and videos.

  

Start a Free 10-Day Trial


  
  • Safari Books Online
  • Create BookmarkCreate Bookmark
  • Create Note or TagCreate Note or Tag
  • PrintPrint