I had the interesting opportunity to be a third party to a battle of analysts today, and I thought I would share some of the things I learned from that conversation.
On Monday, SearchEnterpriseLinux.com posted a story on Active Directory and Linux authentication (http://searchenterpriselinux.techtarget.com/originalContent/0,289142,sid39_gci1279624,00.html). The story gave a general overview, attempting to lay out some of the more mainstream ways IT pros are using AD to manage identity, authentication and security on their Linux servers. These include LDAP and Kerberos protocols, Samba 3, and proprietary third party cross platform management applications. While there was room to expand on the points made and some areas that could have been articulated better, the article was not intended to be in-depth from a technical point of view. But, as the reporter who filed that story, I can appreciate when an expert in the field takes the time to email me and explain, politely, that there were a few things that needed clarification.
On Monday, SearchEnterpriseLinux.com posted a story on Active Directory and Linux authentication (http://searchenterpriselinux.techtarget.com/originalContent/0,289142,sid39_gci1279624,00.html). The story gave a general overview, attempting to lay out some of the more mainstream ways IT pros are using AD to manage identity, authentication and security on their Linux servers. These include LDAP and Kerberos protocols, Samba 3, and proprietary third party cross platform management applications. While there was room to expand on the points made and some areas that could have been articulated better, the article was not intended to be in-depth from a technical point of view. But, as the reporter who filed that story, I can appreciate when an expert in the field takes the time to email me and explain, politely, that there were a few things that needed clarification.
Link: enterpriselinuxlog.blogs.techtarget.com
Category:
- Linux