Patrick Weemeeuw writes:
> For general information, see http://www.redhat.com/linux-info/pam/
> and for Linux-PAM: http://gluon.physics.ucla.edu/~morgan/pam/


Got it. Thanks.

> But to answer your question in short: PAM (which stands for pluggable
> authentication modules) is an API that encapsulates (hopefully) all
> authentication methods.  As a consequence, an authentication client
> using PAM does not need to be reengineered any more to be able to use
> a new authentication method (e.g kerberos, s/key, id-cards...), but
> the new authentication method must be coded once as a PAM module to be
> available to all applications.
> ...

It seems it does not contain shadow completely, though.

Since the shadow transition is almost completed I wonder what we shoudl do
now.

Michael
-- 
Michael Meskes                   |    _____ ________ __  ____
[EMAIL PROTECTED] |   / ___// ____/ // / / __ \___  __________
[EMAIL PROTECTED]                  |   \__ \/ /_  / // /_/ /_/ / _ \/ ___/ ___/
[EMAIL PROTECTED]                |  ___/ / __/ /__  __/\__, /  __/ /  (__  )
Use Debian Linux!                | /____/_/      /_/  /____/\___/_/  /____/


Reply via email to