Secure Programming for Linux and Unix HOWTO | ||
---|---|---|
<<< Previous | Summary of Linux and Unix Security Features | Next >>> |
Sun Solaris and nearly all Linux systems use the Pluggable Authentication Modules (PAM) system for authentication. PAM permits run-time configuration of authentication methods (e.g., use of passwords, smart cards, etc.). See the section called Using PAM in the chapter called Special Topics for more information on using PAM.
<<< Previous | Home | Next >>> |
Audit | Up | Specialized Security Extensions for Unix-like Systems |