Content deleted Content added
Improved definition |
Added citation for section without it, and removed citation template |
||
Line 1:
{{Infobox software
| name = Linux PAM
Line 30 ⟶ 29:
'''Linux Pluggable Authentication Modules''' (PAM) is a suite of libraries that allows a Linux [[system administrator]] to configure methods to [[Authentication|authenticate]] users. It provides a flexible and centralized way to switch authentication methods for secured applications by using configuration files instead of changing application code.<ref>{{Cite web|title=Chapter 1. Introduction|url=http://www.linux-pam.org/Linux-PAM-html/sag-introduction.html|url-status=live|access-date=2021-02-28|website=A Linux-PAM Page}}</ref> There are Linux PAM libraries allowing authentication using methods such as local passwords, [[Lightweight Directory Access Protocol|LDAP]], or fingerprint readers.<ref>{{Cite web|last=Lauber|first=Susan|date=2020-07-22|title=An introduction to Pluggable Authentication Modules (PAM) in Linux|url=https://www.redhat.com/sysadmin/pluggable-authentication-modules-pam|url-status=live|access-date=2021-02-28|website=Red Hat|language=en}}</ref> Linux PAM is evolved from the [[Unix]] [[Pluggable Authentication Modules]] architecture.<ref>{{Cite web|url=https://www.linuxjournal.com/article/5940|title=Securing Applications on Linux with PAM {{!}} Linux Journal|last=Fernandes|first=Savio|last2=Reddy|first2=KLM|website=[[Linux Journal]]|language=en|access-date=2018-09-30}}</ref>
Linux-PAM separates the tasks of authentication into four independent management groups:<ref>{{Cite web|title=pam.d(8): Pluggable Authentication Modules for - Linux man page|url=https://linux.die.net/man/8/pam.d|access-date=2021-02-28|website=linux.die.net}}</ref>
* account modules check that the specified account is a valid authentication target under current conditions. This may include conditions like account expiration, time of day, and that the user has access to the requested service.
* authentication modules verify the user's identity, for example by requesting and checking a password or other secret. They may also pass authentication information on to other systems like a [[Keyring (cryptography)|keyring]].
Line 47 ⟶ 46:
* [http://www.linux-pam.org/ Primary distribution site for the Linux-PAM project]
*[https://github.com/linux-pam/linux-pam Development site for the Linux-PAM project]
* [http://aplawrence.com/Basics/understandingpam.html ''Understanding PAM'', by A.P. Lawrence]
* [https://likegeeks.com/linux-pam-easy-guide/ ''Linux PAM modules'', by Mokhtar Ebrahim]
|