This section contains the following chapters:
Chapter 22, Authentication Configuration describes how to configure various authentication methods that Oracle Linux can use, including NIS, LDAP, Kerberos, and Winbind, and how you can configure the System Security Services Daemon feature to provide centralized identity and authentication management.
Chapter 23, Local Account Configuration describes how to configure and manage local user and group accounts.
Chapter 24, System Security Administration describes the subsystems that you can use to administer system security, including SELinux, the Netfilter firewall, TCP Wrappers, chroot jails, auditing, system logging, and process accounting.
Chapter 25, OpenSSH Configuration describes how to configure OpenSSH to support secure communication between networked systems.
Table of Contents
- 22 Authentication Configuration
- 22.1 About Authentication
- 22.2 About Local Oracle Linux Authentication
- 22.3 About IPA
- 22.4 About LDAP Authentication
- 22.4.1 About LDAP Data Interchange Format
- 22.4.2 Configuring an LDAP Server
- 22.4.3 Replacing the Default Certificates
- 22.4.4 Creating and Distributing Self-signed CA Certificates
- 22.4.5 Initializing an Organization in LDAP
- 22.4.6 Adding an Automount Map to LDAP
- 22.4.7 Adding a Group to LDAP
- 22.4.8 Adding a User to LDAP
- 22.4.9 Adding Users to a Group in LDAP
- 22.4.10 Enabling LDAP Authentication
- 22.5 About NIS Authentication
- 22.6 About Kerberos Authentication
- 22.7 About Pluggable Authentication Modules
- 22.8 About the System Security Services Daemon
- 22.9 About Winbind Authentication
- 23 Local Account Configuration
- 24 System Security Administration
- 24.1 About System Security
- 24.2 Configuring and Using SELinux
- 24.3 About Packet-filtering Firewalls
- 24.4 About TCP Wrappers
- 24.5 About chroot Jails
- 24.6 About Auditing
- 24.7 About System Logging
- 24.8 About Process Accounting
- 24.9 Security Guidelines
- 24.9.1 Minimizing the Software Footprint
- 24.9.2 Configuring System Logging
- 24.9.3 Disabling Core Dumps
- 24.9.4 Minimizing Active Services
- 24.9.5 Locking Down Network Services
- 24.9.6 Configuring a Packet-filtering Firewall
- 24.9.7 Configuring TCP Wrappers
- 24.9.8 Configuring Kernel Parameters
- 24.9.9 Restricting Access to SSH Connections
- 24.9.10 Configuring File System Mounts, File Permissions, and File Ownerships
- 24.9.11 Checking User Accounts and Privileges
- 25 OpenSSH Configuration