Let PAM take care of GNU/Linux security for you
When they hear the word PAM, most people think of a certain blonde Canadian Playmate, but readers of this Web site surely will recognize the basic element of Linux security: the Pluggable Authentication Modules. So let's talk about how this PAM works, and look at some examples of how it is used. If each Linux program had to include its own authentication logic, we'd go crazy. How could you trust that all your applications implemented the same checks? And how could you implement extra controls?
|
|
Full Story |
This topic does not have any threads posted yet!
You cannot post until you login.