Using PAM
To use PAM (Pluggable Authentication Modules), you need to understand how it works. PAM uses a number of files to help determine whether authentication is approved or denied. The first set of files you need to understand are the files in /etc/pam.d/. Listing 15.1 shows the contents of /etc/pam.d. (Your directory might not look like this listing.) Each restricted service you install or uninstall should add or delete its own corresponding service file.
Code Listing 15.1. Sample /etc/pam.d Listing
README chsh imap login passwd rexec rsh su chfn ftp kde other pop rlogin samba |
Every restricted service has a corresponding file. If one is not installed, you can create one. If the installed file does not suit your purposes, you can modify ...
Get Special Edition Using Linux®, Sixth Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.