Home
last modified time | relevance | path

Searched refs:authentication (Results 1 – 25 of 486) sorted by relevance

12345678910>>...20

/freebsd/crypto/krb5/src/config-files/
H A Dservices.append1 kerberos 88/udp kdc # Kerberos authentication--udp
2 kerberos 88/tcp kdc # Kerberos authentication--tcp
3 kerberos_master 751/udp # Kerberos authentication
4 kerberos_master 751/tcp # Kerberos authentication
/freebsd/crypto/openssh/
H A Dsshd_config59 # Change to "yes" to enable built-in password authentication.
64 # Change to "no" to disable keyboard-interactive authentication. Depending on
67 # Keyboard interactive authentication is also used for PAM authentication.
80 # Set this to 'no' to disable PAM authentication, account processing,
81 # and session processing. If this is enabled, PAM authentication will
84 # PAM authentication via KbdInteractiveAuthentication may bypass
87 # PAM authentication, then enable this but set PasswordAuthentication
H A DOVERVIEW76 implement X11 forwarding, TCP/IP forwarding, and authentication
82 - Code to communicate with the authentication agent is in authfd.c.
86 - Code for various authentication methods resides in auth-*.c
93 - In the client end, authentication code is in sshconnect.c. It
96 authentication agent using authfd.c.
103 proxy), and performs authentication (ssh_login in sshconnect.c).
139 negotiate encryption, then perform authentication, preparatory
149 - authentication
/freebsd/contrib/pam-krb5/tests/data/scripts/alt-auth/
H A Dfail-debug1 # Test failure of alternative authentication principal. -*- conf -*-
21 DEBUG /^\(user %u\) alternate authentication failed: /
22 DEBUG (user %u) attempting authentication as %u@%2
24 NOTICE authentication failure; logname=%u uid=%i euid=%i tty= ruser= rhost=
H A Dforce-fail-debug1 # Test failure of forced authentication principal (no fallback). -*- conf -*-
21 DEBUG /^\(user %u\) alternate authentication failed: /
22 NOTICE authentication failure; logname=%u uid=%i euid=%i tty= ruser= rhost=
H A Dfallback-debug1 # Test alternative authentication principal with debug logging. -*- conf -*-
27 DEBUG /^\(user %u\) alternate authentication failed: /
28 DEBUG (user %u) attempting authentication as %u
H A Dfail1 # Test failure of alternative authentication principal. -*- conf -*-
19 NOTICE authentication failure; logname=%u uid=%i euid=%i tty= ruser= rhost=
H A Donly-fail1 # Test failure of required alternative authentication. -*- conf -*-
22 NOTICE authentication failure; logname=%u uid=%i euid=%i tty= ruser= rhost=
/freebsd/contrib/wpa/hostapd/
H A Dhlr_auc_gw.txt4 database/authentication gateway interface to HLR/AuC. It could be
6 authentication center (HLR/AuC). hostapd will send SIM/AKA
7 authentication queries over a UNIX domain socket to and external
10 hlr_auc_gw can be configured with GSM and UMTS authentication data with
13 dynamic authentication data for EAP-SIM, EAP-AKA, and EAP-AKA' while the
34 -g<triplet file> = path for GSM authentication triplets
79 authentication server for EAP-SIM/AKA/AKA':
H A DREADME2 Authenticator and RADIUS authentication server
56 included in the kernel driver: using external RADIUS authentication
62 EAP server (i.e., allow full authentication without requiring
63 an external RADIUS authentication server), and RADIUS authentication
64 server for EAP authentication.
81 Any wired Ethernet driver for wired IEEE 802.1X authentication
104 minimal authentication mechanism for stations, whereas IEEE 802.1X
110 a station and it performs the authentication with the Authentication
149 will first perform IEEE 802.11 authentication. This is normally done
150 with open systems authentication, so there is no security. After
[all …]
/freebsd/contrib/pam-krb5/tests/data/scripts/realm/
H A Dfail-no-realm-debug1 # Test authentication failure due to wrong realm. -*- conf -*-
18 DEBUG (user %u) attempting authentication as %u@%0
20 NOTICE authentication failure; logname=%u uid=%i euid=%i tty= ruser= rhost=
H A Dfail-no-realm1 # Test authentication failure due to wrong realm. -*- conf -*-
17 NOTICE authentication failure; logname=%u uid=%i euid=%i tty= ruser= rhost=
H A Dfail-bad-user-realm1 # Test authentication failure with different user_realm. -*- conf -*-
17 NOTICE authentication failure; logname=%u uid=%i euid=%i tty= ruser= rhost=
H A Dfail-realm1 # Test authentication failure with different realm. -*- conf -*-
17 NOTICE authentication failure; logname=%u uid=%i euid=%i tty= ruser= rhost=
/freebsd/contrib/wpa/wpa_supplicant/doc/docbook/
H A Deapol_test.sgml49 authentication client code from hostapd. In addition, it has
66 test suite for a RADIUS authentication server.</para>
75 <para>tries to complete EAP authentication based on the network
77 on the local host. A re-authentication is triggered to test fast
78 re-authentication. The configuration file uses the same format for
96 <listitem><para>IP address of the authentication server. The
110 <listitem><para>UDP port of the authentication server. The
117 <listitem><para>Shared secret with the authentication server.
184 <listitem><para>Save configuration after authentication.
/freebsd/release/packages/ucl/
H A Dgssd-all.ucl22 The Generic Security Services (GSS) API is used to perform authentication over
23 a network connection, most commonly when using Kerberos authentication.
27 to fetch authentication data such as Kerberos tickets from userland.
29 This daemon is required when using Kerberos authentication with NFS.
H A Dpam-all.ucl19 comment = "Modular user authentication facility"
23 wish to authenticate users, such as login(1) or sshd(8), with authentication
24 providers that handle various authentication methods, such as UNIX passwords
/freebsd/contrib/pam-krb5/docs/
H A Dpam_krb5.pod24 operations: authentication, account management, session management, and
28 authentication and session management modules so that each application
29 doesn't have to know the best way to check user authentication or create a
42 performs a Kerberos initial authentication, storing the obtained
53 After doing the initial authentication, the Kerberos PAM module will
55 verify those tickets. Unless this step is performed, the authentication
61 fail authentication. If you want to skip this check, set the
148 Kerberos authentication. If the network is not available, some Kerberos
153 authentication module such as B<pam_unix> first with a control field of
155 password authentication was successful.
[all …]
/freebsd/contrib/pam-krb5/tests/data/scripts/no-cache/
H A Dprompt-fail-debug1 # Test failed password authentication with debug logging. -*- conf -*-
26 DEBUG (user %u) attempting authentication as %u
28 NOTICE authentication failure; logname=%u uid=%i euid=%i tty= ruser= rhost=
H A Dprompt-fail1 # Test failed password authentication. -*- conf -*-
25 NOTICE authentication failure; logname=%u uid=%i euid=%i tty= ruser= rhost=
/freebsd/contrib/pam-krb5/tests/data/scripts/long/
H A Dpassword1 # Test authentication with an excessively long password. -*- conf -*-
14 NOTICE authentication failure; logname=%u uid=%i euid=%i tty= ruser= rhost=
/freebsd/contrib/pam-krb5/tests/data/scripts/expired/
H A Ddefer-mit-debug32 DEBUG (user %u) attempting authentication as %0
41 DEBUG (user %u) attempting authentication as %0 for kadmin/changepw
46 DEBUG (user %u) attempting authentication as %0
H A Dfail-debug21 DEBUG (user %u) attempting authentication as %0
23 NOTICE authentication failure; logname=%u uid=%i euid=%i tty= ruser= rhost=
/freebsd/tools/regression/iscsi/
H A Dctl.conf7 discovery-auth-group no-authentication
11 auth-group no-authentication
/freebsd/lib/libpam/pam.d/
H A DREADME27 account: non-authentication based authorization, based on time,
30 password: update authentication tokens.
48 use_first_pass: try authentication using password from the
50 try_first_pass: first try authentication using password from

12345678910>>...20