Linux PAM
|
|
This article includes a list of references, but its sources remain unclear because it has insufficient inline citations. (September 2010) (Learn how and when to remove this template message)
|
| Stable release |
1.3.0 / April 28, 2016
|
|---|---|
| Written in | C |
| Operating system | Linux |
| Type | authentication |
| License | GNU General Public License or Revised BSD License |
| Website | www |
Linux Pluggable Authentication Modules (PAM) provide dynamic authentication support for applications and services in a Linux or GNU/kFreeBSD[1] system. Linux PAM is evolved from the Unix Pluggable Authentication Modules architecture.
Linux-PAM separates the tasks of authentication into four independent management groups:
- account modules check that the specified account is a valid authentication target under current conditions. This may include conditions like account expiration, time of day, and that the user has access to the requested service.
- authentication modules verify the user's identity, for example by requesting and checking a password or other secret. They may also pass authentication information on to other systems like a keyring.
- password modules are responsible for updating passwords, and are generally coupled to modules employed in the authentication step. They may also be used to enforce strong passwords.
- session modules define actions that are performed at the beginning and end of sessions. A session starts after the user has successfully authenticated.
See also[edit]
References[edit]
External links[edit]
- Linux-PAM page
- pam.d(8) - Linux man page
- Development site for the Linux-PAM project
- Understanding PAM, by A.P. Lawrence
| This security software article is a stub. You can help Wikipedia by expanding it. |