Export (0) Print
Expand All
Expand Minimize

Windows Security and Directory Services for UNIX Guide v1.0

About This Guide
Volume 1: Overview and Envisioning
Chapter 1: Overview of Authentication and Authorization Technologies and Solution End States
Chapter 2: Envisioning Your Windows Security and Directory Services Solution
Volume 2: Solutions Using Kerberos Authentication (End States 1 and 2)
Chapter 1: Choosing the Right Technology and Planning Your Solution
Chapter 2: Using Quest Software VAS to Develop, Stabilize, Deploy, Operate, and Evolve End State 2
Chapter 3: Using Centrify Direct Control to Develop, Stabilize, Deploy, Operate, and Evolve End State 2
Chapter 4: Developing a Custom Solution
Chapter 5: Stabilizing a Custom Solution
Chapter 6: Deploying a Custom Solution
Chapter 7: Operating a Custom Solution
Chapter 8: Evolving a Custom Solution
Appendices
Appendix A: Architectural Overview of UNIX and Windows Authentication and Authorization
Appendix B: Pertinent RFCs
Appendix C: Kerberos and LDAP Error Messages
Appendix D: Kerberos and LDAP Troubleshooting Tips
Appendix E: Relevant Windows and UNIX Tools
Appendix F: Migrating Digital Identity Information to Active Directory
Appendix G: Configuring DNS for a Heterogeneous UNIX and Windows Environment
Appendix H: Configuring Time Services for a Heterogeneous UNIX and Windows Environment
Appendix I: Sample Configuration Files for Custom Solutions
Appendix J: Custom Technology Solutions Capabilities Matrix
Appendix K: Acronym List
Appendix L: Installing and Configuring Active Directory and DNS in Your Lab
Appendix M: Bibliography/References
© 2014 Microsoft