![]() This uses the credentials from the Linux system itself to authenticate to. This is the system that is present on Linux systems, and is the default choice for the Access Server. Management of credentials is handled in the ‘user permissions’ area of the admin web services of the Access Server. It contains both the user properties and the user credentials. ![]() This method relies on using an SQLite3 database that is stored on the Access Server’s file system itself. By default without using post_auth the following sources can be authenticated against in Access Server: ![]() The post_auth programming hook in Access Server was put in to extend the possibilities of the Access Server to authenticate against a source of credentials. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |