Book Image

Pluggable Authentication Modules: The Definitive Guide to PAM for Linux SysAdmins and C Developers

By : Kenneth Geisshirt
Book Image

Pluggable Authentication Modules: The Definitive Guide to PAM for Linux SysAdmins and C Developers

By: Kenneth Geisshirt

Overview of this book

<p>PAM-aware applications reduce the complexity of authentication. With PAM you can use the same user database for every login process. PAM also supports different authentication processes as required. Moreover, PAM is a well-defined API, and PAM-aware applications will not break if you change the underlying authentication configuration.<br /><br />The PAM framework is widely used by most Linux distributions for authentication purposes. Originating from Solaris 2.6 ten years ago, PAM is used today by most proprietary and free UNIX operating systems including GNU/Linux, FreeBSD, and Solaris, following both the design concept and the practical details. PAM is thus a unifying technology for authentication mechanisms in UNIX. <br /><br />PAM is a modular and flexible authentication management layer that sits between Linux applications and the native underlying authentication system. PAM can be implemented with various applications without having to recompile the applications to specifically support PAM.</p>
Table of Contents (13 chapters)

Working with Secure Shell


The secure shell (ssh) is regarded as a much better protocol than telnet and rsh for connecting to remote hosts. The Secure shell can be used for logging in, copying files, executing commands, and building VPN solutions. The connection is encrypted from the beginning, and most secure shell implementations are able to detect man-in-the-middle attacks. With contemporary fast computers, the overhead of encrypting the communication is not noticeable except for very large files, and there is no excuse to keep using telnet and ftp. ssh clients exist for Microsoft Windows so even webmasters can be forced to shift from the insecure ftp solution of the past.

Working with ssh involves creating a pair of encryption keys. The private key is kept at your computer, while the public key can be stored on the remote computer, and you can log in without typing in your password every time. Many hard-working system administrators see this as a big time-saver. But in order to keep your...