| Secure Programming for Linux and Unix HOWTO | ||
|---|---|---|
| <<< Previous | Summary of Linux and Unix Security Features | Next >>> |
Sun Solaris and nearly all Linux systems use the Pluggable Authentication Modules (PAM) system for authentication. PAM permits run-time configuration of authentication methods (e.g., use of passwords, smart cards, etc.). See the section called Using PAM in the chapter called Special Topics for more information on using PAM.
| <<< Previous | Home | Next >>> |
| Audit | Up | Specialized Security Extensions for Unix-like Systems |