33. Pluggable Authentication Modules (PAM) Flashcards
1
Q
Learning Objectives
By the end of this chapter, you should be able to:
A
- Explain the basic concepts that motivate the use of PAM.
- List the steps involved in the authentication process.
- Use and modify PAM configuration files.
- Know how to interpret PAM rules and create new ones.
- Apply LDAP to use and administer distributed directory services over the network.
2
Q
PAM: A Unified Approach to Authentication
What does PAM stand for?
A
Plugable Authentication Module
3
Q
PAM: A Unified Approach to Authentication
What is PAM used for?
A
It a unified approach for applications to authenicate users via many different authenication methods. It is a shared library/module that applications can import to use to authenticate users rather then roll out their own authentication strategy (why keep rebuilding the wheel).