03-04-2012
Quote:
Originally Posted by
dr_mabuse
I need a real time server, but in the tutorial it tries to run PAM or whatever. these are audio drivers !!
I'm sorry, but it's really funny!
Since when did PAM become an audio driver? It's Pluggable Authentication Module which is, in a very basic term, responsible for you to be able to login to Linux machine successfully.
By the way, what do you need a "real-time server" for? I suggest that you first brush-up the concept of real-time systems first.
10 More Discussions You Might Find Interesting
1. AIX
After enabling PAm , passwd command does not work properly
error in passwd
# passwd pamuser
Changing password for "pamuser"
pamuser's New password:
Enter the new password again:
3004-709 Error changing password for "pamuser".
... (0 Replies)
Discussion started by: ayeshaseerin
0 Replies
2. UNIX for Advanced & Expert Users
I have suse (SLES 9) machine,I would like to know how to creat a PAM
configure file for ldap authentication and loading it using a "config"
argument to pam_ldap.so
Thanks for your help (0 Replies)
Discussion started by: hassan1
0 Replies
3. AIX
Does any one know how to get aix 5.3 pam working ..
Is there any pathc to make it work (0 Replies)
Discussion started by: ayeshaseerin
0 Replies
4. Solaris
Hi Experts,
Appended is the pam.conf file in my Sol 5.10 client which uses AD for authentication(Followed scott Lowe's blog on AD-Solaris integration):
bash-3.00# cat /etc/pam.conf
##ident "@(#)pam.conf 1.31 07/12/07 SMI"
# Copyright 2007 Sun Microsystems, Inc. All rights reserved.... (9 Replies)
Discussion started by: Hari_Ganesh
9 Replies
5. Red Hat
Hello,
I'm now analysing the working of PAM.
PAM works with config-files, that you can find under the directory /etc/pam.d.
One of those config.-files is the file: login.conf.
------------------------------------------------------------------------------------------------------
#... (0 Replies)
Discussion started by: caroline
0 Replies
6. Solaris
How do we know if PAM is turned on? I think that there is no process or anything that we can check for. Anyway to ensure that rather than doing a configuration and "physical" testing on a machine? (5 Replies)
Discussion started by: incredible
5 Replies
7. UNIX for Dummies Questions & Answers
Hi, on a lab computer another user (who is a sudoer) changed my password without my permission. I'm pretty positive it was her, though I can't conclusively prove it. I had my friend, who is another sudoer on the machine, fix it and make me a sudoer now too.
So everything is fine, but I want... (0 Replies)
Discussion started by: declannalced
0 Replies
8. UNIX for Advanced & Expert Users
I have applied pam authentication for local users as highlighted in below file.
# cat /etc/pam.d/system-auth
#%PAM-1.0
# This file is auto-generated.
# User changes will be destroyed the next time authconfig is run.
auth required pam_env.so
auth sufficient pam_unix.so... (0 Replies)
Discussion started by: pinga123
0 Replies
9. SuSE
Hi,
I use a software which can create account on many system or application.
One of resource which is managed by this soft his a server SUSE Linux Enterprise Server 10 (x86_64). patch level 3.
This application which is an IBM application use ssh to launch command to create account in... (3 Replies)
Discussion started by: scabarrus
3 Replies
10. SuSE
Hello all,
I recently updated PAM policy files (pam_authz.policy) on HP-UX Servers with AD groups involving allowing and denying the certain groups..
Could anyone tell me what is the equivalent mechanism in SLES(Linux)? Is it possible to allow/deny AD group access with the SLES LDAP... (0 Replies)
Discussion started by: lcclaj0
0 Replies
PAM(8) BSD System Manager's Manual PAM(8)
NAME
pam -- Pluggable Authentication Modules framework
DESCRIPTION
The Pluggable Authentication Modules (PAM) framework is a system of libraries that perform authentication tasks for services and applica-
tions. Applications that use the PAM API may have their authentication behavior configured by the system administrator though the use of the
service's PAM configuration file.
PAM modules provide four classes of functionality:
account Account verification services such as password expiration and access control.
auth Authentication services. This usually takes the form of a challenge-response conversation. However, PAM can also support, with
appropriate hardware support, biometric devices, smart-cards, and so forth.
password Password (or, more generally, authentication token) change and update services.
session Session management services. These are tasks that are performed before access to a service is granted and after access to a ser-
vice is withdrawn. These may include updating activity logs or setting up and tearing down credential forwarding agents.
A primary feature of PAM is the notion of ``stacking'' different modules together to form a processing chain for the task. This allows
fairly precise control over how a particular authentication task is performed, and under what conditions. PAM module configurations may also
inherit stacks from other module configurations, providing some degree of centralized administration.
SEE ALSO
login(1), passwd(1), su(1), pam(3), pam.conf(5), pam_chroot(8), pam_deny(8), pam_echo(8), pam_exec(8), pam_ftpusers(8), pam_group(8),
pam_guest(8), pam_krb5(8), pam_ksu(8), pam_lastlog(8), pam_login_access(8), pam_nologin(8), pam_permit(8), pam_radius(8), pam_rhosts(8),
pam_rootok(8), pam_securetty(8), pam_self(8), pam_skey(8), pam_ssh(8), pam_unix(8)
HISTORY
The Pluggable Authentication Module framework was originally developed by SunSoft, described in DCE/OSF-RFC 86.0, and first deployed in
Solaris 2.6. It was later incorporated into the X/Open Single Sign-On Service (XSSO) Pluggable Authentication Modules specifiation.
The Pluggable Authentication Module framework first appeared in NetBSD 3.0.
BSD
February 28, 2005 BSD