Using PAM

To use PAM (Pluggable Authentication Modules), you need to understand how it works. PAM uses a number of files to help determine whether authentication is approved or denied. The first set of files you need to understand are the files in /etc/pam.d/. Listing 15.1 shows the contents of /etc/pam.d. (Your directory might not look like this listing.) Each restricted service you install or uninstall should add or delete its own corresponding service file.

Code Listing 15.1. Sample /etc/pam.d Listing
README  chsh  imap  login  passwd  rexec   rsh    su
chfn    ftp   kde   other  pop     rlogin  samba

Every restricted service has a corresponding file. If one is not installed, you can create one. If the installed file does not suit your purposes, you can modify ...

Get Special Edition Using Linux®, Sixth Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.