33. Pluggable Authentication Modules (PAM) Flashcards

1
Q

Learning Objectives

By the end of this chapter, you should be able to:

A
  • Explain the basic concepts that motivate the use of PAM.
  • List the steps involved in the authentication process.
  • Use and modify PAM configuration files.
  • Know how to interpret PAM rules and create new ones.
  • Apply LDAP to use and administer distributed directory services over the network.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

PAM: A Unified Approach to Authentication

What does PAM stand for?

A

Plugable Authentication Module

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

PAM: A Unified Approach to Authentication

What is PAM used for?

A

It a unified approach for applications to authenicate users via many different authenication methods. It is a shared library/module that applications can import to use to authenticate users rather then roll out their own authentication strategy (why keep rebuilding the wheel).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly