| ||
Linux has a powerful array of possible authentication mechanisms. Heck, we haven't even explored them all. But we have visited the ones you'll likely find in most networks.
Getting them set up can be a chore, but you only have to get them set up once. Getting both Linux and Windows clients to leverage your preferred authentication mechanism can be another chore, but it's very rewarding when it's done.
In the next chapter, we'll turn the tables a bit. You'll leverage Active Directory as the "go to" point for authentication. Turn the page to see how to do it!
| ||