O'Reilly logo

Security for Linux on System z by Sri Venkatesen, Nilesh Patel, Eric Marins, Eduardo Kienetz, William Johnston, Vic Cross, Jonathan Barney, Lydia Parziale

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Authentication and access control
The process of access control is critical. It defines how users and systems can communicate, and their approach. Access control refers to controlling or limiting access to system resources, including data, and thus protects information from unauthorized access.
Authentication of Linux users with a central LDAP directory instead of using information stored locally on the system (in /etc/passwd and in /etc/shadow) is a usual practice to reduce the administration effort in an environment with multiple Linux systems. ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required