>>>>> "lh" == Lawrence Houston <[EMAIL PROTECTED]> writes:

  lh> Although I achived my objectives with RH 4.2's PAM, I find this
  lh> solution is NOT as "tidy" as LOGIN using /etc/usertty directly.
  lh> For systems with configurations with more "complicated" than
  lh> mine, LOGIN's original scheme might still make more sense?

IMHO not.   You can change the rules for a PAMified restriction
without having to relink all the executables that are affected.

I'm waiting for the first report of someone with retinal scanner
authentication.   PAM provides the infrastructure.   It just needs the
hardware (and the accomanying PAM module).


-- 
  PLEASE read the Red Hat FAQ, Tips, Errata and the MAILING LIST ARCHIVES!
http://www.redhat.com/RedHat-FAQ /RedHat-Errata /RedHat-Tips /mailing-lists
         To unsubscribe: mail [EMAIL PROTECTED] with 
                       "unsubscribe" as the Subject.

Reply via email to