On Sun, Jan 09, 2005 at 11:59:09PM -0500, Robert L Cochran wrote: > I've printed Chapter 20 because the LDAP discussion will help greatly > with one of my current projects. I'll comment on this more later this > week. I do think your How-to serves a very important need. I'm already > planning to point some friends to it. > > I wish the chapter on SSH authentication would show how to use only > public key authentication, disabling other types. > > Bob Cochran > I was also interested in the LDAP discussion and the work is so voluminous I hate to suggest added subjects. However, we here are interested in using LDAP as an alternative to NIS to do login authorization. It would be nice to have that process covered. ======================================================================= "Irrationality is the square root of all evil" -- Douglas Hofstadter ------------------------------------------- Aaron Konstam Computer Science Trinity University One Trinity Place. San Antonio, TX 78212-7200 telephone: (210)-999-7484 email:akonstam@xxxxxxxxxxx