With a few quick steps, you can turn your old comment system into a new way to engage your visitors.
From small blogs to massive websites, Disqus is the easiest way to build active communities. It’s free to use and works with virtually any type of website.
Tag Archives: authentication
IETF explores new working group on identity management in the cloud
IETF explores new working group on identity management in the cloud.
A specification already exists for Simple Cloud Identity Management (SCIM) that is supported by security software vendors including Cisco, Courion, Ping Identity, UnboundID and SailPoint. SCIM also has support from key cloud vendors, including Salesforce, Google and VMware.
RADIUS
Remote Authentication Dial In User Service (RADIUS) is a networking protocol that provides centralized Authentication, Authorization, and Accounting (AAA) management for computers to connect and use a network service. RADIUS was developed by Livingston Enterprises, Inc., in 1991 as an access server authentication and accounting protocol and later brought into the Internet Engineering Task Force (IETF) standards.[1]
Mozilla offers alternative to OpenID
Mozilla aims for BrowserID to become a more secure alternative to OpenID, the decentralized authentication system offered to users of popular sites such as Google, Yahoo!, PayPal, MySpace and others.
LDAP Authentication In Linux
This howto will show you howto store your users in LDAP and authenticate some of the services against it. I will not show howto install particular packages, as it is distribution/system dependant. I will focus on “pure” configuration of all componenets needed to have LDAP authentication/storage of users. The howto assumes somehow, that you are migrating from a regular passwd/shadow authentication, but it is also suitable for people who do it from scratch.
LDAP Authentication In Linux | HowtoForge – Linux Howtos and Tutorials.
Public key authentication with ssh
Introduction
This LinuxAnswer describes how to set up public key authentication with ssh{1}.
It will include all sub components like scp too.
I will refer to the client machine{2} as the “client” and the server machine{3} as “server”
via Public key authentication with ssh – LinuxQuestions.org.