Home Page Home Page
 Home | Software Development | System/Network Administration | Corporate Services | Resources | About Us
Monthly Server Management One-time Server Services Other Services
Network Administration Network Monitoring Network Security High Availability Load Balancing Data Backup and Recovery
Linux HOWTOs Linux Guides New RFCs Vulnerability list
Partners Careers Site Map
Linux Shadow Password HOWTO Next Previous Contents

Linux Shadow Password HOWTO

Michael H. Jackson, mhjack@tscnet.com

v1.3, 3 April 1996

This document aims to describe how to obtain, install, and configure the Linux password Shadow Suite. It also discusses obtaining, and re]installing other software and network daemons that require access to user passwords. This other software is not actually part of the Shadow Suite, but these programs will need to be recompiled to support the Shadow Suite. This document also contains a programming example for adding shadow support to a program. Answers to some of the more frequently asked questions are included near the end of this document.

1. Introduction.

2. Why shadow your passwd file?

3. Getting the Shadow Suite.

4. Compiling the programs.

5. Installing

6. Other programs you may need to upgrade or patch