How to Configure Authenticated NTP Using Autokey

Solution Unverified - Updated -


  • NTP connections should only be used via authentication
    • Increases likelihood of reliable timesource
    • Lessens chance of attackers broadcasting incorrect time


  • Red Hat Enterprise Linux 5
  • Red Hat Enterprise Linux 6

Subscriber exclusive content

A Red Hat subscription provides unlimited access to our knowledgebase of over 48,000 articles and solutions.

Current Customers and Partners

Log in for full access

Log In