From Red Hat Enterprise Linux 5 Security Technical Implementation Guide
Part of GEN008050
Associated with IA controls: IAIA-2, IAIA-1
Associated with: CCI-000196
The authentication of automated LDAP connections between systems must not use passwords since more secure methods are available, such as PKI and Kerberos. Additionally, the storage of unencrypted passwords on the system is not permitted.
Edit the "/etc/ldap.conf" file to use anonymous binding by removing the "bindpw" option.
Lavender hyperlinks in small type off to the right (of CSS
class id
, if you view the page source) point to
globally unique URIs for each document and item. Copy the
link location and paste anywhere you need to talk
unambiguously about these things.
You can obtain data about documents and items in other
formats. Simply provide an HTTP header Accept:
text/turtle
or
Accept: application/rdf+xml
.
Powered by sagemincer