Remove Authentication Remove Linux Remove Virtualization
article thumbnail

Potential Fix for Kerberos, SSH, LDAP, and Active Directory Issue

Scott Lowe

I had a reader contact me with a question on using Kerberos and LDAP for authentication into Active Directory, based on Active Directory integration work I did many years ago. The issue was that he was experiencing a problem using native Kerberos authentication against Active Directory with SSH. Thanks Tomas!

article thumbnail

Technology Short Take 176

Scott Lowe

Ivan Pepelnjak dives deep on DHCP relaying on a Linux host. Rob McBryde shares his story of reviving a 2012 MacBook Pro with Linux. Security In early February a vulnerability was uncovered in a key component of the Linux boot process. Think Linux doesn’t have malware? Rory McCune explains Kubernetes authentication.

Linux 113
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

MicroK8s: Up and Running in Azure

Linux Academy

By now you’ve heard the stories that Microsoft loves Linux and fully embraces the open-source world. Windows Subsystem for Linux (WSL). Contact them via email: linux@microsoft.com. The only requirement is a Linux VM. Cloud sandboxes are included with your Linux Academy subscription. Visual Studio Code.

Linux 143
article thumbnail

Beginner’s Basics of Kubernetes

Linux Academy

You can set up and package everything that you need into an application, and execute that package without the virtual machine overhead that is normally rendered during that process. A pod is a group of containers that are put together as a group on the same node (virtual machine) and are designed specifically for easy communication.

Policies 159
article thumbnail

Using Curl to Interact with a RESTful API

Scott Lowe

Let’s start with passing some JSON data to a REST API to authenticate. Example 1: Authenticating to OpenStack. Let’s say you’re working with an OpenStack-based cloud, and you need to authenticate to OpenStack using OpenStack Identity (“Keystone”). Example 2: Authenticating to VMware NSX.

article thumbnail

Technology Short Take #25

Scott Lowe

Erik Smith, notably known for his outstanding posts on storage and FCoE, takes a stab at describing some of the differences between SDN and network virtualization in this post. I came across this post on CloudFoundry’s User Account and Authentication Service (the UAA). Virtualization. Cloud Computing/Cloud Management.

Storage 92
article thumbnail

Using Secure Configurations | Standardize Your Security

Linux Academy

For network devices, we should consider using RADIUS/TACACS+ for authentication purposes, not a shared user account. I understand not everyone “builds” workstations and servers, as many organizations use imaging and virtual templates. Network Device Configurations. We need to disable silly protocols, such as “finger.”