- Related articles
- What Does LC Stand for in Fiber?
- The Difference between PCI Express x1, x4, x8 and x16
- The Things You Need to Know about 40GBASE-CR4 Ethernet Standards
- All Cisco MFEFX1's information (List price, Specs, Datasheet PDF, Compatibility matrix)
- Fiber Optic Solutions for Cisco C3KX-NM-10G Module
- All Cisco SFP-10GB-SR's information (List price, Specs, Datasheet PDF, Compatibility matri
- Optical Transceivers for Cisco SG300-52P-K9-UK Switch
- Optical Transceivers for Cisco SF112-24-UK Switch
- What is Linux PAM module?
- Optical Transceivers for Cisco SG550XG-24F-K9-EU Switch
Recommend tag
What is Linux PAM module?
2016-07-14
Definition:
Linux Pluggable Authentication Modules (PAM) provide dynamic authentication support for applications and services in a Linux or GNU/kFreeBSD system. Linux PAM module is evolved from the Unix Pluggable Authentication Modules architecture. Linux PAM module uses a pluggable, modular architecture, which affords the system administrator a great deal of flexibility in setting authentication policies for the system.
Function:
Linux PAM module separates the tasks of authentication into four independent management groups:
- Account modules check that the specified account is a valid authentication target under current conditions. This may include conditions like account expiration, time of day, and that the user has access to the requested service.
- Authentication modules verify the user's identity, for example by requesting and checking a password or other secret. They may also pass authentication information on to other systems like a keyring.
- Password modules are responsible for updating passwords, and are generally coupled to modules employed in the authentication step. They may also be used to enforce strong passwords.
- Session modules define actions that are performed at the beginning and end of sessions. A session starts after the user has successfully authenticated.
Purpose:
It is the purpose of the Linux PAM module to separate the development of privilege granting software from the development of secure and appropriate authentication schemes. This is accomplished by providing a library of functions that an application may use to request that a user be authenticated." With Linux PAM module, it doesn't matter whether your password is stored in. When a program needs to authenticate a user, Linux PAM module provides a library containing the functions for the proper authentication scheme. Because this library is loaded dynamically, changing authentication schemes can be done by simply editing a configuration file.
Strengths:
Flexibility is one of Linux PAM module greatest strengths. PAM can be configured to deny certain programs the right to authenticate users, to only allow certain users to be authenticated, to warn when certain programs attempt to authenticate, or even to deprive all users of login privileges. Linux PAM module design gives you complete control over how users are authenticated.
Please click to check more related concepts:
Framework | Authentication module |
TECHNICAL SUPPORT
Get solutions or consultation from the technical team.