Chapter 12. Identity Management

IN THIS CHAPTER

Managing user accounts, including passwords, on individual systems does not scale well when an administrator must maintain hundreds or thousands of users on hundreds or thousands of systems, often around the world. Many services are available for Red Hat Enterprise Linux to allow users to authenticate from a central, remote server, which can also store user information that can be retrieved from client systems.

Some of the advantages of using a network service for user information and authentication include only having to back up this data from one system, updating ...

Get Red Hat® Enterprise Linux® 5 Administration Unleashed now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.