Norbert Veber <[EMAIL PROTECTED]> writes:
> What sorts of things can pam do?  I only know that for example a long
> program that uses PAM works regardless of weather the password file is
> shadowed or not, but can it do more advanced authentication, ie. could it be
> used to replace radius?

PAM, as I understand it, provides the hooks that enable you to plug in
different authentication/authorization (NIS, NIS+, shadow, passwd,
kerberos, radius, etc).  That way, you have a pam'ified /bin/login,
rather than having a kerbified login, a shadow login, etc etc.

It's used by RedHat and Solaris.

-- 
.....A. P. [EMAIL PROTECTED]<URL:http://www.onShore.com/>


--  
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to