This chapter presents a number of short recipes on how to use PAM in the real world. The recipes are neither representative for all PAM uses nor are they optimal solutions. PAM is a set of bricks, which can be put together in endless number of ways.
Using the right modules, it is possible to authenticate Linux and UNIX users against directory services like Microsoft Active Directory. Unfortunately, the success of such a project depend on how AD is configured.
Letting the users in to the computer is one thing but restricting access to certain services and resources is another thing. Again, PAM has a rich set of modules to cope with almost anything you can come up with.