Linux PAM: Difference between revisions
Appearance
Content deleted Content added
m Dating maintenance tags: {{More footnotes}} |
GNU/kFreeBSD is no longer maintained |
||
Line 28: | Line 28: | ||
| website = {{URL|http://www.linux-pam.org/}} |
| website = {{URL|http://www.linux-pam.org/}} |
||
}} |
}} |
||
'''Linux Pluggable Authentication Modules''' (PAM) provide dynamic authentication support for applications and services in a [[Linux]] |
'''Linux Pluggable Authentication Modules''' (PAM) provide dynamic authentication support for applications and services in a [[Linux]] system. Linux PAM is evolved from the [[Unix]] [[Pluggable Authentication Modules]] architecture.<ref>{{Cite web|url=https://www.linuxjournal.com/article/5940|title=Securing Applications on Linux with PAM {{!}} Linux Journal|last=Fernandes|first=Savio|last2=Reddy|first2=KLM|date=|website=[[Linux Journal]]|language=en|archive-url=|archive-date=|dead-url=|access-date=2018-09-30}}</ref> |
||
Linux-PAM separates the tasks of authentication into four independent management groups: |
Linux-PAM separates the tasks of authentication into four independent management groups: |
Revision as of 07:50, 7 June 2019
This article includes a list of general references, but it lacks sufficient corresponding inline citations. (March 2019) |
Stable release | 1.3.1
/ May 18, 2018 |
---|---|
Repository | https://github.com/linux-pam/linux-pam |
Written in | C |
Operating system | Linux |
Type | authentication |
License | GNU General Public License or Revised BSD License |
Website | www |
Linux Pluggable Authentication Modules (PAM) provide dynamic authentication support for applications and services in a Linux system. Linux PAM is evolved from the Unix Pluggable Authentication Modules architecture.[1]
Linux-PAM separates the tasks of authentication into four independent management groups:
- account modules check that the specified account is a valid authentication target under current conditions. This may include conditions like account expiration, time of day, and that the user has access to the requested service.
- authentication modules verify the user's identity, for example by requesting and checking a password or other secret. They may also pass authentication information on to other systems like a keyring.
- password modules are responsible for updating passwords, and are generally coupled to modules employed in the authentication step. They may also be used to enforce strong passwords.
- session modules define actions that are performed at the beginning and end of sessions. A session starts after the user has successfully authenticated.
See also
References
- ^ Fernandes, Savio; Reddy, KLM. "Securing Applications on Linux with PAM | Linux Journal". Linux Journal. Retrieved 2018-09-30.
{{cite web}}
: Cite has empty unknown parameter:|dead-url=
(help)
External links
- Linux-PAM page
- pam.d(8) - Linux man page
- Development site for the Linux-PAM project
- Understanding PAM, by A.P. Lawrence
- Linux PAM modules, by Mokhtar Ebrahim