[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Re: Shadow vss PAM



Patrick Weemeeuw writes:
> For general information, see http://www.redhat.com/linux-info/pam/
> and for Linux-PAM: http://gluon.physics.ucla.edu/~morgan/pam/


Got it. Thanks.

> But to answer your question in short: PAM (which stands for pluggable
> authentication modules) is an API that encapsulates (hopefully) all
> authentication methods.  As a consequence, an authentication client
> using PAM does not need to be reengineered any more to be able to use
> a new authentication method (e.g kerberos, s/key, id-cards...), but
> the new authentication method must be coded once as a PAM module to be
> available to all applications.
> ...

It seems it does not contain shadow completely, though.

Since the shadow transition is almost completed I wonder what we shoudl do
now.

Michael
-- 
Michael Meskes                   |    _____ ________ __  ____
meskes@informatik.rwth-aachen.de |   / ___// ____/ // / / __ \___  __________
meskes@sanet.de                  |   \__ \/ /_  / // /_/ /_/ / _ \/ ___/ ___/
meskes@debian.org                |  ___/ / __/ /__  __/\__, /  __/ /  (__  )
Use Debian Linux!                | /____/_/      /_/  /____/\___/_/  /____/



Reply to: