The Identity Stack: From LDAP to Zero Trust
A 13-episode series on enterprise authentication — from the protocol that replaced /etc/passwd in the 1980s to Zero Trust identity and workload certificates in the 2020s.
Who it’s for: Linux administrators, DevOps engineers, and infrastructure security practitioners who have configured SSSD, joined machines to Active Directory, or debugged PAM — and want to understand why the stack is built the way it is.
# Query your enterprise directory
ldapsearch -x -H ldap://your-dc -b "dc=corp,dc=com" "(uid=you)" cn mail
# Get a Kerberos ticket, inspect it
kinit [email protected] && klist -e
# Trace an SSH login through PAM + SSSD
journalctl -u sssd -f # then SSH in from another terminal
By EP12, you’ll enable SSH login to a Linux VM with Entra ID credentials and read every step in the auth log.
Published Episodes
| EP | Title |
|---|---|
| EP01 | What Is LDAP — and Why It Was Invented to Replace Something Worse |
More episodes coming weekly.
Start with EP01: What Is LDAP? →
Get new episodes in your inbox → linuxcent.com/subscribe