Re: Shadow vss PAM
Patrick Weemeeuw writes:
> For general information, see http://www.redhat.com/linux-info/pam/
> and for Linux-PAM: http://gluon.physics.ucla.edu/~morgan/pam/
Got it. Thanks.
> But to answer your question in short: PAM (which stands for pluggable
> authentication modules) is an API that encapsulates (hopefully) all
> authentication methods. As a consequence, an authentication client
> using PAM does not need to be reengineered any more to be able to use
> a new authentication method (e.g kerberos, s/key, id-cards...), but
> the new authentication method must be coded once as a PAM module to be
> available to all applications.
> ...
It seems it does not contain shadow completely, though.
Since the shadow transition is almost completed I wonder what we shoudl do
now.
Michael
--
Michael Meskes | _____ ________ __ ____
meskes@informatik.rwth-aachen.de | / ___// ____/ // / / __ \___ __________
meskes@sanet.de | \__ \/ /_ / // /_/ /_/ / _ \/ ___/ ___/
meskes@debian.org | ___/ / __/ /__ __/\__, / __/ / (__ )
Use Debian Linux! | /____/_/ /_/ /____/\___/_/ /____/
Reply to: