Kerberos: The Definitive Guide

The Definitive Guide

Author: Jason Garman

Publisher: "O'Reilly Media, Inc."

ISBN: 9781449390778

Category: Computers

Page: 274

View: 9572

Kerberos, the single sign-on authentication system originally developed at MIT, deserves its name. It's a faithful watchdog that keeps intruders out of your networks. But it has been equally fierce to system administrators, for whom the complexity of Kerberos is legendary.Single sign-on is the holy grail of network administration, and Kerberos is the only game in town. Microsoft, by integrating Kerberos into Active Directory in Windows 2000 and 2003, has extended the reach of Kerberos to all networks large or small. Kerberos makes your network more secure and more convenient for users by providing a single authentication system that works across the entire network. One username; one password; one login is all you need.Fortunately, help for administrators is on the way. Kerberos: The Definitive Guide shows you how to implement Kerberos for secure authentication. In addition to covering the basic principles behind cryptographic authentication, it covers everything from basic installation to advanced topics like cross-realm authentication, defending against attacks on Kerberos, and troubleshooting.In addition to covering Microsoft's Active Directory implementation, Kerberos: The Definitive Guide covers both major implementations of Kerberos for Unix and Linux: MIT and Heimdal. It shows you how to set up Mac OS X as a Kerberos client. The book also covers both versions of the Kerberos protocol that are still in use: Kerberos 4 (now obsolete) and Kerberos 5, paying special attention to the integration between the different protocols, and between Unix and Windows implementations.If you've been avoiding Kerberos because it's confusing and poorly documented, it's time to get on board! This book shows you how to put Kerberos authentication to work on your Windows and Unix systems.
Release

Kerberos

The Definitive Guide

Author: Jason Garman

Publisher: "O'Reilly Media, Inc."

ISBN: 0596004036

Category: Computers

Page: 253

View: 521

Kerberos, the single sign-on authentication system originally developed at MIT, deserves its name. It's a faithful watchdog that keeps intruders out of your networks. But it has been equally fierce to system administrators, for whom the complexity of Kerberos is legendary. Single sign-on is the holy grail of network administration, and Kerberos is the only game in town. Microsoft, by integrating Kerberos into Active Directory in Windows 2000 and 2003, has extended the reach of Kerberos to all networks large or small. Kerberos makes your network more secure and more convenient for users by providing a single authentication system that works across the entire network. One username; one password; one login is all you need. Fortunately, help for administrators is on the way. Kerberos: The Definitive Guide shows you how to implement Kerberos for secure authentication. In addition to covering the basic principles behind cryptographic authentication, it covers everything from basic installation to advanced topics like cross-realm authentication, defending against attacks on Kerberos, and troubleshooting. In addition to covering Microsoft's Active Directory implementation, Kerberos: The Definitive Guide covers both major implementations of Kerberos for Unix and Linux: MIT and Heimdal. It shows you how to set up Mac OS X as a Kerberos client. The book also covers both versions of the Kerberos protocol that are still in use: Kerberos 4 (now obsolete) and Kerberos 5, paying special attention to the integration between the different protocols, and between Unix and Windows implementations. If you've been avoiding Kerberos because it's confusing and poorly documented, it's time to get on board! This book shows you how to put Kerberos authentication to work on your Windows and Unix systems.
Release

Mastering OpenLDAP

Configuring, Securing, and Integrating Directory Services

Author: Matt Butcher

Publisher: Packt Publishing Ltd

ISBN: 1847191037

Category: Computers

Page: 467

View: 6519

Install, Configure, Build, and Integrate Secure Directory Services with OpenLDAP server in a networked environment
Release

LDAP System Administration

Putting Directories to Work

Author: Gerald Carter

Publisher: "O'Reilly Media, Inc."

ISBN: 9780596551919

Category: Computers

Page: 312

View: 2202

Be more productive and make your life easier. That's what LDAP System Administration is all about.System administrators often spend a great deal of time managing configuration information located on many different machines: usernames, passwords, printer configurations, email client configurations, and network filesystem configurations, to name a few. LDAPv3 provides tools for centralizing all of the configuration information and placing it under your control. Rather than maintaining several administrative databases (NIS, Active Directory, Samba, and NFS configuration files), you can make changes in only one place and have all your systems immediately "see" the updated information.Practically platform independent, this book uses the widely available, open source OpenLDAP 2 directory server as a premise for examples, showing you how to use it to help you manage your configuration information effectively and securely. OpenLDAP 2 ships with most Linux® distributions and Mac OS® X, and can be easily downloaded for most Unix-based systems. After introducing the workings of a directory service and the LDAP protocol, all aspects of building and installing OpenLDAP, plus key ancillary packages like SASL and OpenSSL, this book discusses: Configuration and access control Distributed directories; replication and referral Using OpenLDAP to replace NIS Using OpenLDAP to manage email configurations Using LDAP for abstraction with FTP and HTTP servers, Samba, and Radius Interoperating with different LDAP servers, including Active Directory Programming using Net::LDAP If you want to be a master of your domain, LDAP System Administration will help you get up and running quickly regardless of which LDAP version you use. After reading this book, even with no previous LDAP experience, you'll be able to integrate a directory server into essential network services such as mail, DNS, HTTP, and SMB/CIFS.
Release

Using Samba

A File & Print Server for Linux, Unix & Mac OS X

Author: Gerald Carter,Jay Ts,Robert Eckstein

Publisher: "O'Reilly Media, Inc."

ISBN: 1449373097

Category: Computers

Page: 450

View: 6045

This book is the comprehensive guide to Samba administration, officially adopted by the Samba Team. Wondering how to integrate Samba's authentication with that of a Windows domain? How to get Samba to serve Microsoft Dfs shares? How to share files on Mac OS X? These and a dozen other issues of interest to system administrators are covered. A whole chapter is dedicated to troubleshooting! The range of this book knows few bounds. Using Samba takes you from basic installation and configuration -- on both the client and server side, for a wide range of systems -- to subtle details of security, cross-platform compatibility, and resource discovery that make the difference between whether users see the folder they expect or a cryptic error message. The current edition covers such advanced 3.x features as: Integration with Active Directory and OpenLDAP Migrating from Windows NT 4.0 domains to Samba Delegating administrative tasks to non-root users Central printer management Advanced file serving features, such as making use of Virtual File System (VFS) plugins. Samba is a cross-platform triumph: robust, flexible and fast, it turns a Unix or Linux system into a file and print server for Microsoft Windows network clients. This book will help you make your file and print sharing as powerful and efficient as possible. The authors delve into the internals of the Windows activities and protocols to an unprecedented degree, explaining the strengths and weaknesses of each feature in Windows domains and in Samba itself. Whether you're playing on your personal computer or an enterprise network, on one note or a full three-octave range, Using Samba will give you an efficient and secure server.
Release

Network Security with OpenSSL

Cryptography for Secure Communications

Author: John Viega,Matt Messier,Pravir Chandra

Publisher: "O'Reilly Media, Inc."

ISBN: 9780596551971

Category: Computers

Page: 386

View: 5381

Most applications these days are at least somewhat network aware, but how do you protect those applications against common network security threats? Many developers are turning to OpenSSL, an open source version of SSL/TLS, which is the most widely used protocol for secure network communications.The OpenSSL library is seeing widespread adoption for web sites that require cryptographic functions to protect a broad range of sensitive information, such as credit card numbers and other financial transactions. The library is the only free, full-featured SSL implementation for C and C++, and it can be used programmatically or from the command line to secure most TCP-based network protocols.Network Security with OpenSSL enables developers to use this protocol much more effectively. Traditionally, getting something simple done in OpenSSL could easily take weeks. This concise book gives you the guidance you need to avoid pitfalls, while allowing you to take advantage of the library?s advanced features. And, instead of bogging you down in the technical details of how SSL works under the hood, this book provides only the information that is necessary to use OpenSSL safely and effectively. In step-by-step fashion, the book details the challenges in securing network communications, and shows you how to use OpenSSL tools to best meet those challenges.As a system or network administrator, you will benefit from the thorough treatment of the OpenSSL command-line interface, as well as from step-by-step directions for obtaining certificates and setting up your own certification authority. As a developer, you will further benefit from the in-depth discussions and examples of how to use OpenSSL in your own programs. Although OpenSSL is written in C, information on how to use OpenSSL with Perl, Python and PHP is also included.OpenSSL may well answer your need to protect sensitive data. If that?s the case, Network Security with OpenSSL is the only guide available on the subject.
Release

Hadoop Security

Protecting Your Big Data Platform

Author: Ben Spivey,Joey Echeverria

Publisher: "O'Reilly Media, Inc."

ISBN: 1491901349

Category: Computers

Page: 340

View: 4563

As more corporations turn to Hadoop to store and process their most valuable data, the risk of a potential breach of those systems increases exponentially. This practical book not only shows Hadoop administrators and security architects how to protect Hadoop data from unauthorized access, it also shows how to limit the ability of an attacker to corrupt or modify data in the event of a security breach. Authors Ben Spivey and Joey Echeverria provide in-depth information about the security features available in Hadoop, and organize them according to common computer security concepts. You’ll also get real-world examples that demonstrate how you can apply these concepts to your use cases. Understand the challenges of securing distributed systems, particularly Hadoop Use best practices for preparing Hadoop cluster hardware as securely as possible Get an overview of the Kerberos network authentication protocol Delve into authorization and accounting principles as they apply to Hadoop Learn how to use mechanisms to protect data in a Hadoop cluster, both in transit and at rest Integrate Hadoop data ingest into enterprise-wide security architecture Ensure that security architecture reaches all the way to end-user access
Release

Hadoop: The Definitive Guide

Author: Tom White

Publisher: "O'Reilly Media, Inc."

ISBN: 1449338771

Category: Computers

Page: 688

View: 2558

Ready to unlock the power of your data? With this comprehensive guide, you’ll learn how to build and maintain reliable, scalable, distributed systems with Apache Hadoop. This book is ideal for programmers looking to analyze datasets of any size, and for administrators who want to set up and run Hadoop clusters. You’ll find illuminating case studies that demonstrate how Hadoop is used to solve specific problems. This third edition covers recent changes to Hadoop, including material on the new MapReduce API, as well as MapReduce 2 and its more flexible execution model (YARN). Store large datasets with the Hadoop Distributed File System (HDFS) Run distributed computations with MapReduce Use Hadoop’s data and I/O building blocks for compression, data integrity, serialization (including Avro), and persistence Discover common pitfalls and advanced features for writing real-world MapReduce programs Design, build, and administer a dedicated Hadoop cluster—or run Hadoop in the cloud Load data from relational databases into HDFS, using Sqoop Perform large-scale data processing with the Pig query language Analyze datasets with Hive, Hadoop’s data warehousing system Take advantage of HBase for structured and semi-structured data, and ZooKeeper for building distributed systems
Release

Active Directory

Designing, Deploying, and Running Active Directory

Author: Brian Desmond,Joe Richards,Robbie Allen,Alistair G. Lowe-Norris

Publisher: "O'Reilly Media, Inc."

ISBN: 1449369863

Category: Computers

Page: 738

View: 3581

Organize your network resources by learning how to design, manage, and maintain Active Directory. Updated to cover Windows Server 2012, the fifth edition of this bestselling book gives you a thorough grounding in Microsoft’s network directory service by explaining concepts in an easy-to-understand, narrative style. You’ll negotiate a maze of technologies for deploying a scalable and reliable AD infrastructure, with new chapters on management tools, searching the AD database, authentication and security protocols, and Active Directory Federation Services (ADFS). This book provides real-world scenarios that let you apply what you’ve learned—ideal whether you’re a network administrator for a small business or a multinational enterprise. Upgrade Active Directory to Windows Server 2012 Learn the fundamentals, including how AD stores objects Use the AD Administrative Center and other management tools Learn to administer AD with Windows PowerShell Search and gather AD data, using the LDAP query syntax Understand how Group Policy functions Design a new Active Directory forest Examine the Kerberos security protocol Get a detailed look at the AD replication process
Release

RADIUS

Securing Public Access to Private Resources

Author: Jonathan Hassell

Publisher: "O'Reilly Media, Inc."

ISBN: 0596003226

Category: Computers

Page: 190

View: 2895

RADIUS, or Remote Authentication Dial-In User Service, is a widely deployed protocol that enables companies to authenticate, authorize and account for remote users who want access to a system or service from a central network server. RADIUS provides a complete, detailed guide to the underpinnings of the RADIUS protocol. Author Jonathan Hassell brings practical suggestions and advice for implementing RADIUS and provides instructions for using an open-source variation called FreeRADIUS.
Release

The Official Samba-3 HOWTO and Reference Guide

Author: John H. Terpstra,Jelmer R. Vernooij

Publisher: Prentice Hall Professional

ISBN: 9780131453555

Category: Computers

Page: 685

View: 5504

A guide to the features of Samba-3 provides step-by-step installation instructions on integrating Samba into a Windows or UNIX environment.
Release

The Ultimate Windows Server 2003 System Administrator's Guide

Author: G. Robert Williams,Mark Walla

Publisher: Addison-Wesley Professional

ISBN: 9780201791068

Category: Computers

Page: 956

View: 8517

-- Not only explains the new features of Windows .NET Server 2003, but also provides continued support for Windows 2000 administration.-- Covers changes in security, Active Directory, Microsoft Management Console, and integration with the .NET Framework, among many others changes.Windows .NET Server 2003 is the first Microsoft product that is innately affected by the company's recent Trustworthy Computing initiative. If this is successful, this will be the most stable, reliable, and dependable server OS that Microsoft has ever released. It will also feature an integrated environment with the .NET Framework and the Common Language Runtime. The Ultimate Windows .NET Server 2003 System Administrator's Guide is an essential resource for planning, deploying, and administering a Windows .NET enterprise system. The authors draw on years of experience designing and administering Windows NT and UNIX systems in order to guide you through the varied tasks involved in real-world system administration. There are detailed discussions of key Windows .NET Server administrative functions, and descriptions of many advanced tools and optional components. In addition the authors have included a comprehensive and convenient command reference.
Release

Linux in a Windows World

Author: Roderick W. Smith

Publisher: "O'Reilly Media, Inc."

ISBN: 9780596007584

Category: Computers

Page: 478

View: 3194

A companion for any system administrator interested in integrating Linux into their Windows environment. This book takes an in-depth look at exactly how Linux can be brought into an organization that's currently based on Microsoft Windows system. With tips and techniques, it has the practical advice you need to migrate to this software.
Release

Implementing Samba 4

Author: Marcelo Leal

Publisher: Packt Publishing Ltd

ISBN: 1782166599

Category: Computers

Page: 284

View: 5958

This book is an implementation tutorial covering step-by-step procedures, examples, and sample code, and has a practical approach to set up a Samba 4 Server as an Active Directory Domain Controller and also set up different Samba 4 server roles. This book is ideal for system administrators who are new to the Samba 4 software, and who are looking to get a good grounding in how to use Samba 4 to implement Active Directory Services. It's assumed that you will have some experience with general system administration, Active Directory, and GNU/Linux systems. Readers are expected to have some test machines (virtual machines), which will be used to execute the examples within this book.
Release

802.11 Wireless Networks: The Definitive Guide

The Definitive Guide

Author: Matthew S. Gast

Publisher: "O'Reilly Media, Inc."

ISBN: 1449319521

Category: Computers

Page: 672

View: 709

As we all know by now, wireless networks offer many advantages over fixed (or wired) networks. Foremost on that list is mobility, since going wireless frees you from the tether of an Ethernet cable at a desk. But that's just the tip of the cable-free iceberg. Wireless networks are also more flexible, faster and easier for you to use, and more affordable to deploy and maintain.The de facto standard for wireless networking is the 802.11 protocol, which includes Wi-Fi (the wireless standard known as 802.11b) and its faster cousin, 802.11g. With easy-to-install 802.11 network hardware available everywhere you turn, the choice seems simple, and many people dive into wireless computing with less thought and planning than they'd give to a wired network. But it's wise to be familiar with both the capabilities and risks associated with the 802.11 protocols. And 802.11 Wireless Networks: The Definitive Guide, 2nd Edition is the perfect place to start.This updated edition covers everything you'll ever need to know about wireless technology. Designed with the system administrator or serious home user in mind, it's a no-nonsense guide for setting up 802.11 on Windows and Linux. Among the wide range of topics covered are discussions on: deployment considerations network monitoring and performance tuning wireless security issues how to use and select access points network monitoring essentials wireless card configuration security issues unique to wireless networks With wireless technology, the advantages to its users are indeed plentiful. Companies no longer have to deal with the hassle and expense of wiring buildings, and households with several computers can avoid fights over who's online. And now, with 802.11 Wireless Networks: The Definitive Guide, 2nd Edition, you can integrate wireless technology into your current infrastructure with the utmost confidence.
Release

Cassandra: The Definitive Guide

Distributed Data at Web Scale

Author: Jeff Carpenter,Eben Hewitt

Publisher: "O'Reilly Media, Inc."

ISBN: 1491933631

Category: Computers

Page: 370

View: 5622

Imagine what you could do if scalability wasn't a problem. With this hands-on guide, you’ll learn how the Cassandra database management system handles hundreds of terabytes of data while remaining highly available across multiple data centers. This expanded second edition—updated for Cassandra 3.0—provides the technical details and practical examples you need to put this database to work in a production environment. Authors Jeff Carpenter and Eben Hewitt demonstrate the advantages of Cassandra’s non-relational design, with special attention to data modeling. If you’re a developer, DBA, or application architect looking to solve a database scaling issue or future-proof your application, this guide helps you harness Cassandra’s speed and flexibility. Understand Cassandra’s distributed and decentralized structure Use the Cassandra Query Language (CQL) and cqlsh—the CQL shell Create a working data model and compare it with an equivalent relational model Develop sample applications using client drivers for languages including Java, Python, and Node.js Explore cluster topology and learn how nodes exchange data Maintain a high level of performance in your cluster Deploy Cassandra on site, in the Cloud, or with Docker Integrate Cassandra with Spark, Hadoop, Elasticsearch, Solr, and Lucene
Release

Active Directory Cookbook

Author: Laura E. Hunter,Robbie Allen

Publisher: "O'Reilly Media, Inc."

ISBN: 0596554443

Category: Computers

Page: 1092

View: 9134

When you need practical hands-on support for Active Directory, the updated edition of this extremely popular Cookbook provides quick solutions to more than 300 common (and uncommon) problems you might encounter when deploying, administering, and automating Microsoft's network directory service. For the third edition, Active Directory expert Laura E. Hunter offers troubleshooting recipes based on valuable input from Windows administrators, in addition to her own experience. You'll find solutions for the Lightweight Directory Access Protocol (LDAP), ADAM (Active Directory Application Mode), multi-master replication, Domain Name System (DNS), Group Policy, the Active Directory Schema, and many other features. The Active Directory Cookbook will help you: Perform Active Directory tasks from the command line Use scripting technologies to automate Active Directory tasks Manage new Active Directory features, such as Read-Only Domain Controllers, fine-grained password policies, and more Create domains and trusts Locate users whose passwords are about to expire Apply a security filter to group policy objects Check for potential replication problems Restrict hosts from performing LDAP queries View DNS server performance statistics Each recipe includes a discussion explaining how and why the solution works, so you can adapt the problem-solving techniques to similar situations. Active Directory Cookbook is ideal for any IT professional using Windows Server 2008, Exchange 2007, and Identity Lifecycle Manager 2007, including Active Directory administrators looking to automate task-based solutions. "It is rare for me to visit a customer site and not see a copy of Active Directory Cookbook on a shelf somewhere, which is a testament to its usefulness. The Cookbook takes the pain out of everyday AD tasks by providing concise, clear and relevant recipes. The fact that the recipes are provided using different methods (graphical user interface, command line and scripting) means that the book is suitable for anyone working with AD on a day-to-day basis. The introduction of PowerShell examples in this latest edition will be of particular interest for those looking to transition from VBScript. Laura has also done a great job in extending the Cookbook in this edition to encompass the broad range of changes to AD in Windows Server 2008." --Tony Murray, Founder of Activedir.org and Directory Services MVP "If you already understand Active Directory fundamentals and are looking fora quick solution to common Active Directory related tasks, look no further,you have found the book that you need." --joe Richards, Directory Services MVP "The Active Directory Cookbook is the real deal... a soup-to-nuts catalog of every administrative task an Active Directory administrator needs to perform. If you administer an Active Directory installation, this is the very first book you have to put on your shelf." --Gil Kirkpatrick, Chief Architect, Active Directory and Identity Management, Quest Software and Directory Services MVP
Release

LDAP Programming Management and Integration

Author: Clayton Donley

Publisher: Manning Publications

ISBN: 9781930110403

Category: Computers

Page: 326

View: 3721

Explains how to link non-LDAP data with LDAP directories, introducing the LDAP standard and covering topics including directory synchronization, authenticating users, and accessing directories with Perl.
Release

Jenkins: The Definitive Guide

Continuous Integration for the Masses

Author: John Ferguson Smart

Publisher: "O'Reilly Media, Inc."

ISBN: 144931306X

Category: Computers

Page: 404

View: 5667

Streamline software development with Jenkins, the popular Java-based open source tool that has revolutionized the way teams think about Continuous Integration (CI). This complete guide shows you how to automate your build, integration, release, and deployment processes with Jenkins—and demonstrates how CI can save you time, money, and many headaches. Ideal for developers, software architects, and project managers, Jenkins: The Definitive Guide is both a CI tutorial and a comprehensive Jenkins reference. Through its wealth of best practices and real-world tips, you'll discover how easy it is to set up a CI service with Jenkins. Learn how to install, configure, and secure your Jenkins server Organize and monitor general-purpose build jobs Integrate automated tests to verify builds, and set up code quality reporting Establish effective team notification strategies and techniques Configure build pipelines, parameterized jobs, matrix builds, and other advanced jobs Manage a farm of Jenkins servers to run distributed builds Implement automated deployment and continuous delivery
Release

HBase: The Definitive Guide

Random Access to Your Planet-Size Data

Author: Lars George

Publisher: "O'Reilly Media, Inc."

ISBN: 1449315224

Category: Computers

Page: 556

View: 3876

If you're looking for a scalable storage solution to accommodate a virtually endless amount of data, this book shows you how Apache HBase can fulfill your needs. As the open source implementation of Google's BigTable architecture, HBase scales to billions of rows and millions of columns, while ensuring that write and read performance remain constant. Many IT executives are asking pointed questions about HBase. This book provides meaningful answers, whether you’re evaluating this non-relational database or planning to put it into practice right away. Discover how tight integration with Hadoop makes scalability with HBase easier Distribute large datasets across an inexpensive cluster of commodity servers Access HBase with native Java clients, or with gateway servers providing REST, Avro, or Thrift APIs Get details on HBase’s architecture, including the storage format, write-ahead log, background processes, and more Integrate HBase with Hadoop's MapReduce framework for massively parallelized data processing jobs Learn how to tune clusters, design schemas, copy tables, import bulk data, decommission nodes, and many other tasks
Release