| /freebsd/crypto/krb5/src/config-files/ |
| H A D | services.append | 1 kerberos 88/udp kdc # Kerberos authentication--udp 2 kerberos 88/tcp kdc # Kerberos authentication--tcp 3 kerberos_master 751/udp # Kerberos authentication 4 kerberos_master 751/tcp # Kerberos authentication
|
| /freebsd/crypto/openssh/ |
| H A D | sshd_config | 59 # Change to "yes" to enable built-in password authentication. 64 # Change to "no" to disable keyboard-interactive authentication. Depending on 67 # Keyboard interactive authentication is also used for PAM authentication. 80 # Set this to 'no' to disable PAM authentication, account processing, 81 # and session processing. If this is enabled, PAM authentication will 84 # PAM authentication via KbdInteractiveAuthentication may bypass 87 # PAM authentication, then enable this but set PasswordAuthentication
|
| H A D | OVERVIEW | 76 implement X11 forwarding, TCP/IP forwarding, and authentication 82 - Code to communicate with the authentication agent is in authfd.c. 86 - Code for various authentication methods resides in auth-*.c 93 - In the client end, authentication code is in sshconnect.c. It 96 authentication agent using authfd.c. 103 proxy), and performs authentication (ssh_login in sshconnect.c). 139 negotiate encryption, then perform authentication, preparatory 149 - authentication
|
| /freebsd/contrib/pam-krb5/tests/data/scripts/alt-auth/ |
| H A D | fail-debug | 1 # Test failure of alternative authentication principal. -*- conf -*- 21 DEBUG /^\(user %u\) alternate authentication failed: / 22 DEBUG (user %u) attempting authentication as %u@%2 24 NOTICE authentication failure; logname=%u uid=%i euid=%i tty= ruser= rhost=
|
| H A D | force-fail-debug | 1 # Test failure of forced authentication principal (no fallback). -*- conf -*- 21 DEBUG /^\(user %u\) alternate authentication failed: / 22 NOTICE authentication failure; logname=%u uid=%i euid=%i tty= ruser= rhost=
|
| H A D | fallback-debug | 1 # Test alternative authentication principal with debug logging. -*- conf -*- 27 DEBUG /^\(user %u\) alternate authentication failed: / 28 DEBUG (user %u) attempting authentication as %u
|
| H A D | fail | 1 # Test failure of alternative authentication principal. -*- conf -*- 19 NOTICE authentication failure; logname=%u uid=%i euid=%i tty= ruser= rhost=
|
| H A D | only-fail | 1 # Test failure of required alternative authentication. -*- conf -*- 22 NOTICE authentication failure; logname=%u uid=%i euid=%i tty= ruser= rhost=
|
| /freebsd/contrib/wpa/hostapd/ |
| H A D | hlr_auc_gw.txt | 4 database/authentication gateway interface to HLR/AuC. It could be 6 authentication center (HLR/AuC). hostapd will send SIM/AKA 7 authentication queries over a UNIX domain socket to and external 10 hlr_auc_gw can be configured with GSM and UMTS authentication data with 13 dynamic authentication data for EAP-SIM, EAP-AKA, and EAP-AKA' while the 34 -g<triplet file> = path for GSM authentication triplets 79 authentication server for EAP-SIM/AKA/AKA':
|
| H A D | README | 2 Authenticator and RADIUS authentication server 56 included in the kernel driver: using external RADIUS authentication 62 EAP server (i.e., allow full authentication without requiring 63 an external RADIUS authentication server), and RADIUS authentication 64 server for EAP authentication. 81 Any wired Ethernet driver for wired IEEE 802.1X authentication 104 minimal authentication mechanism for stations, whereas IEEE 802.1X 110 a station and it performs the authentication with the Authentication 149 will first perform IEEE 802.11 authentication. This is normally done 150 with open systems authentication, so there is no security. After [all …]
|
| /freebsd/contrib/pam-krb5/tests/data/scripts/realm/ |
| H A D | fail-no-realm-debug | 1 # Test authentication failure due to wrong realm. -*- conf -*- 18 DEBUG (user %u) attempting authentication as %u@%0 20 NOTICE authentication failure; logname=%u uid=%i euid=%i tty= ruser= rhost=
|
| H A D | fail-no-realm | 1 # Test authentication failure due to wrong realm. -*- conf -*- 17 NOTICE authentication failure; logname=%u uid=%i euid=%i tty= ruser= rhost=
|
| H A D | fail-bad-user-realm | 1 # Test authentication failure with different user_realm. -*- conf -*- 17 NOTICE authentication failure; logname=%u uid=%i euid=%i tty= ruser= rhost=
|
| H A D | fail-realm | 1 # Test authentication failure with different realm. -*- conf -*- 17 NOTICE authentication failure; logname=%u uid=%i euid=%i tty= ruser= rhost=
|
| /freebsd/contrib/wpa/wpa_supplicant/doc/docbook/ |
| H A D | eapol_test.sgml | 49 authentication client code from hostapd. In addition, it has 66 test suite for a RADIUS authentication server.</para> 75 <para>tries to complete EAP authentication based on the network 77 on the local host. A re-authentication is triggered to test fast 78 re-authentication. The configuration file uses the same format for 96 <listitem><para>IP address of the authentication server. The 110 <listitem><para>UDP port of the authentication server. The 117 <listitem><para>Shared secret with the authentication server. 184 <listitem><para>Save configuration after authentication.
|
| /freebsd/release/packages/ucl/ |
| H A D | gssd-all.ucl | 22 The Generic Security Services (GSS) API is used to perform authentication over 23 a network connection, most commonly when using Kerberos authentication. 27 to fetch authentication data such as Kerberos tickets from userland. 29 This daemon is required when using Kerberos authentication with NFS.
|
| H A D | pam-all.ucl | 19 comment = "Modular user authentication facility" 23 wish to authenticate users, such as login(1) or sshd(8), with authentication 24 providers that handle various authentication methods, such as UNIX passwords
|
| /freebsd/contrib/pam-krb5/docs/ |
| H A D | pam_krb5.pod | 24 operations: authentication, account management, session management, and 28 authentication and session management modules so that each application 29 doesn't have to know the best way to check user authentication or create a 42 performs a Kerberos initial authentication, storing the obtained 53 After doing the initial authentication, the Kerberos PAM module will 55 verify those tickets. Unless this step is performed, the authentication 61 fail authentication. If you want to skip this check, set the 148 Kerberos authentication. If the network is not available, some Kerberos 153 authentication module such as B<pam_unix> first with a control field of 155 password authentication was successful. [all …]
|
| /freebsd/contrib/pam-krb5/tests/data/scripts/no-cache/ |
| H A D | prompt-fail-debug | 1 # Test failed password authentication with debug logging. -*- conf -*- 26 DEBUG (user %u) attempting authentication as %u 28 NOTICE authentication failure; logname=%u uid=%i euid=%i tty= ruser= rhost=
|
| H A D | prompt-fail | 1 # Test failed password authentication. -*- conf -*- 25 NOTICE authentication failure; logname=%u uid=%i euid=%i tty= ruser= rhost=
|
| /freebsd/contrib/pam-krb5/tests/data/scripts/long/ |
| H A D | password | 1 # Test authentication with an excessively long password. -*- conf -*- 14 NOTICE authentication failure; logname=%u uid=%i euid=%i tty= ruser= rhost=
|
| /freebsd/contrib/pam-krb5/tests/data/scripts/expired/ |
| H A D | defer-mit-debug | 32 DEBUG (user %u) attempting authentication as %0 41 DEBUG (user %u) attempting authentication as %0 for kadmin/changepw 46 DEBUG (user %u) attempting authentication as %0
|
| H A D | fail-debug | 21 DEBUG (user %u) attempting authentication as %0 23 NOTICE authentication failure; logname=%u uid=%i euid=%i tty= ruser= rhost=
|
| /freebsd/tools/regression/iscsi/ |
| H A D | ctl.conf | 7 discovery-auth-group no-authentication 11 auth-group no-authentication
|
| /freebsd/lib/libpam/pam.d/ |
| H A D | README | 27 account: non-authentication based authorization, based on time, 30 password: update authentication tokens. 48 use_first_pass: try authentication using password from the 50 try_first_pass: first try authentication using password from
|