How to Install and Uninstall munge Package on openSUSE Leap
Last updated: January 11,2025
1. Install "munge" package
Please follow the step by step instructions below to install munge on openSUSE Leap
$
sudo zypper refresh
Copied
$
sudo zypper install
munge
Copied
2. Uninstall "munge" package
Please follow the guidance below to uninstall munge on openSUSE Leap:
$
sudo zypper remove
munge
Copied
3. Information about the munge package on openSUSE Leap
Information for package munge:
------------------------------
Repository : Main Repository
Name : munge
Version : 0.5.15-150400.18.3.6
Arch : x86_64
Vendor : SUSE LLC
Installed Size : 372.1 KiB
Installed : No
Status : not installed
Source package : munge-0.5.15-150400.18.3.6.src
Upstream URL : https://dun.github.io/munge/
Summary : An authentication service for creating and validating credentials
Description :
MUNGE (MUNGE Uid 'N' Gid Emporium) is an authentication service for
creating and validating user credentials. It is designed to be highly
scalable for use in an HPC cluster environment. It provides a portable
API for encoding the user's identity into a tamper-proof credential
that can be obtained by an untrusted client and forwarded by untrusted
intermediaries within a security realm. Clients within this realm can
create and validate credentials without the use of root privileges,
reserved ports, or platform-specific methods.
------------------------------
Repository : Main Repository
Name : munge
Version : 0.5.15-150400.18.3.6
Arch : x86_64
Vendor : SUSE LLC
Installed Size : 372.1 KiB
Installed : No
Status : not installed
Source package : munge-0.5.15-150400.18.3.6.src
Upstream URL : https://dun.github.io/munge/
Summary : An authentication service for creating and validating credentials
Description :
MUNGE (MUNGE Uid 'N' Gid Emporium) is an authentication service for
creating and validating user credentials. It is designed to be highly
scalable for use in an HPC cluster environment. It provides a portable
API for encoding the user's identity into a tamper-proof credential
that can be obtained by an untrusted client and forwarded by untrusted
intermediaries within a security realm. Clients within this realm can
create and validate credentials without the use of root privileges,
reserved ports, or platform-specific methods.