The Identity Stack: From LDAP to Zero Trust

Reading Time: < 1 minute

The Identity Stack: From LDAP to Zero Trust

A 13-episode series on enterprise authentication — from the protocol that replaced /etc/passwd in the 1980s to Zero Trust identity and workload certificates in the 2020s.

Who it’s for: Linux administrators, DevOps engineers, and infrastructure security practitioners who have configured SSSD, joined machines to Active Directory, or debugged PAM — and want to understand why the stack is built the way it is.

# Query your enterprise directory
ldapsearch -x -H ldap://your-dc -b "dc=corp,dc=com" "(uid=you)" cn mail

# Get a Kerberos ticket, inspect it
kinit [email protected] && klist -e

# Trace an SSH login through PAM + SSSD
journalctl -u sssd -f   # then SSH in from another terminal

By EP12, you’ll enable SSH login to a Linux VM with Entra ID credentials and read every step in the auth log.


Published Episodes

EP Title
EP01 What Is LDAP — and Why It Was Invented to Replace Something Worse

More episodes coming weekly.


Start with EP01: What Is LDAP? →

Get new episodes in your inbox → linuxcent.com/subscribe