Michael Fair wrote:
>
> Your assumptions are right on.
> (again this is all in the docs)
>
> PAM is the "Pluggable Authentication
> Module" which allows you to authenticate
> users on your system via all kinds of
> crazy methods... LDAP, SQL databases,
> custom programs, other crazy schemes.
> The catch with PAM, I believe, is that
> it is system authentication not just
> imap authentication. So when you
> authenticate via passwd, shadow, or
> PAM you are actually authenticating
> against users on your system which
> kind of defeats the purpose of
> closed server. However that may be
> what you what.
Actually that's not quite true. If you are authenticating with PAM they
don't have to be real users of any sort. PAM splits it's services out.
You actually set up a imap and pop3 section to do PAM. You could even
have them authenticate against two different services types if you
wanted.
Eric
[EMAIL PROTECTED]