天天看點

XMANAGER 連接配接到 REDHAT AS 5

一、 XMANAGER 連接配接到 REDHAT AS 5 需要修改的地方。

rhel5 與 rhel4 不同的地方是, rhel5 裡沒有 /etc/X11/gdm/ 這個目錄, rhel5 的 gdm 的配置檔案放在這裡 /usr/share/gdm/defaults.comf ,這一點可能是困擾大家的地方。

在 /usr/share/gdm/defaults.conf 裡確定有以下幾句配置:

Enable=true

DisplaysPerHost=10

Port=177

在 /etc/inittab 裡把預設級别改為 5 :

id:5:initdefault:

再在這個檔案裡加一句:

x:5:respawn:/usr/bin/gdm

然 後重啟系統。然後在 windows 系統上運作 xmanager2 裡的 Xbrowser 程式,在裡面建立一個 Xmanager Session ,在 Host 這裡輸入 ip 位址,其它配置都不要改變(包括端口号),确定退出。然後輕按兩下這個 New Xmanager Session ,看到登入界面:

二、 如果允許 Root 使用者連接配接到 XMANAGER 需要修改以下内容:

# vi defaults.conf

[security]

# Allow root to login. It makes sense to turn this off for kiosk use, when

# you want to minimize the possibility of break in.

AllowRoot=true

# Allow login as root via XDMCP. This value will be overridden and set to

# false if the /etc/default/login file exists and contains

# "CONSOLE=/dev/login", and set to true if the /etc/default/login file exists

# and contains any other value or no value for CONSOLE.

AllowRemoteRoot=true

# This will allow remote timed login.

AllowRemoteAutoLogin=false

# 0 is the most restrictive, 1 allo

#vi /etc/securetty

......

tty2

tty3

tty4

tty5

tty6

tty7

tty8

tty9

tty10

tty11

pts/0

pts/1

pts/2

pts/3

pts/4

添加這一些。

# vi /etc/pam.d/login

#%PAM-1.0

#auth [user_unknown=ignore success=ok ignore=ignore default=bad] pam_securetty.so

auth include system-auth

account required pam_nologin.so

account include system-auth

password include system-auth

# pam_selinux.so close should be the first session rule

session required pam_selinux.so close

session include system-auth

session required pam_loginuid.so

session optional pam_console.so

# pam_selinux.so open should only be followed by sessions to be executed in the user context

session required pam_selinux.so open

session optional pam_keyinit.so force revoke

~

#vi /etc/pam.d/remote

#%PAM-1.0

#auth required pam_securetty.so

auth include system-auth

account required pam_nologin.so

account include system-auth

password include system-auth

# pam_selinux.so close should be the first session rule

session required pam_selinux.so close

session include system-auth

session required pam_loginuid.so

session optional pam_console.so

# pam_selinux.so open should only be followed by sessions to be executed in the user context

session required pam_selinux.so open

session optional pam_keyinit.so force revoke

~

~

#vi /etc/xinetd.d/telnet

# default: on

# description: The telnet server serves telnet sessions; it uses \

# unencrypted username/password pairs for authentication.

service telnet

{

flags = REUSE

socket_type = stream

wait = no

user = root

server = /usr/sbin/in.telnetd

log_on_failure += USERID

disable = no

}

~

~

~

繼續閱讀