Patrick Weemeeuw writes: > For general information, see http://www.redhat.com/linux-info/pam/ > and for Linux-PAM: http://gluon.physics.ucla.edu/~morgan/pam/
Got it. Thanks. > But to answer your question in short: PAM (which stands for pluggable > authentication modules) is an API that encapsulates (hopefully) all > authentication methods. As a consequence, an authentication client > using PAM does not need to be reengineered any more to be able to use > a new authentication method (e.g kerberos, s/key, id-cards...), but > the new authentication method must be coded once as a PAM module to be > available to all applications. > ... It seems it does not contain shadow completely, though. Since the shadow transition is almost completed I wonder what we shoudl do now. Michael -- Michael Meskes | _____ ________ __ ____ [EMAIL PROTECTED] | / ___// ____/ // / / __ \___ __________ [EMAIL PROTECTED] | \__ \/ /_ / // /_/ /_/ / _ \/ ___/ ___/ [EMAIL PROTECTED] | ___/ / __/ /__ __/\__, / __/ / (__ ) Use Debian Linux! | /____/_/ /_/ /____/\___/_/ /____/