
A comprehensive and practical guide to PAM for Linux: how modules work and how to implement them
Kenneth Geisshirt
Yearly subscription | £150.00 | Monthly subscription | £14.99 |
Overview of Pluggable Authentication Modules: The Definitive Guide to PAM for Linux SysAdmins and C Developers
- Understand and configure PAM
- Develop PAM-aware applications and your own PAMs using the API and C
- How to authenticate users in Active Directory, mount encrypted home directories, load SSH keys automatically, and restrict web and rsh services
[ Detailed Information ]
Language : EnglishPaperback : 124 pages [ 235mm x 191mm ]
Release Date : January 2007
ISBN : 1904811329
ISBN 13 : 978-1-904811-32-9
Author(s) : Kenneth Geisshirt
Topics and Technologies : All Books, Linux Servers, Networking & Telephony
[ Book Links ]
[ In Detail ]
|
PAM-aware applications reduce the complexity of authentication. With PAM you can use the same user database for every login process. PAM also supports different authentication processes as required. Moreover, PAM is a well-defined API, and PAM-aware applications will not break if you change the underlying authentication configuration.
The PAM framework is widely used by most Linux distributions for authentication purposes. Originating from Solaris 2.6 ten years ago, PAM is used today by most proprietary and free UNIX operating systems including GNU/Linux, FreeBSD, and Solaris, following both the design concept and the practical details. PAM is thus a unifying technology for authentication mechanisms in UNIX.
PAM is a modular and flexible authentication management layer that sits between Linux applications and the native underlying authentication system. PAM can be implemented with various applications without having to recompile the applications to specifically support PAM.
First this book explains how Pluggable Authentication Modules (PAM) simplify and standardize authentication in Linux. It shows in detail how PAM works and how it is configured. Then 11 common modules used across UNIX/Linux distributions are examined and explained, including all their parameters. Installation of third-party modules is discussed, and the development of new modules and PAM-aware applications is outlined
What you will learn from this book :
- Using PAM services for authentication in applications
- Using PAM modules common to various operating systems (pam_mkhomedir, pam_mount, pam_succeed_if, pam_nologin, pam_wheel, pam_access, pam_deny, pam_unix, pam_winbind, pam_ldap, pam_mysql)
- Testing and debugging your PAM configuration
- Using PAM and Winbind for integrating any Linux/UNIX computer with Microsoft Active Directory
- Developing your own PAM module in C
Approach
This book provides a practical approach to UNIX/Linux authentication. The design principles are explained thoroughly, then illustrated through the examination of popular modules. It is intended as a one-stop introduction and reference to PAM.
Who this book is written for
This book is for experienced system administrators and developers working with multiple Linux/UNIX servers or with both UNIX and Windows servers. It assumes a good level of admin knowledge, and that developers are competent in C development on UNIX-based systems.

A comprehensive and practical guide to PAM for Linux: how modules work and how to implement them
Kenneth Geisshirt
Overview of Pluggable Authentication Modules: The Definitive Guide to PAM for Linux SysAdmins and C Developers
- Understand and configure PAM
- Develop PAM-aware applications and your own PAMs using the API and C
- How to authenticate users in Active Directory, mount encrypted home directories, load SSH keys automatically, and restrict web and rsh services
- eBook available as PDF, ePub and Mobi downloads and also on PacktLib


With the multi-format deal, you receive access to the book on PacktLib
for free.
PacktLib allows you to access and search across Packt's entire library of over 400 books, finding practical solutions to your searches at the click of a button.
[ Detailed Information ]
Language : EnglishPaperback : 124 pages [ 235mm x 191mm ]
Release Date : January 2007
ISBN : 1904811329
ISBN 13 : 978-1-904811-32-9
Author(s) : Kenneth Geisshirt
Topics and Technologies : All Books, Linux Servers, Networking & Telephony
[ Book Links ]
[ In Detail ]
|
PAM-aware applications reduce the complexity of authentication. With PAM you can use the same user database for every login process. PAM also supports different authentication processes as required. Moreover, PAM is a well-defined API, and PAM-aware applications will not break if you change the underlying authentication configuration.
The PAM framework is widely used by most Linux distributions for authentication purposes. Originating from Solaris 2.6 ten years ago, PAM is used today by most proprietary and free UNIX operating systems including GNU/Linux, FreeBSD, and Solaris, following both the design concept and the practical details. PAM is thus a unifying technology for authentication mechanisms in UNIX.
PAM is a modular and flexible authentication management layer that sits between Linux applications and the native underlying authentication system. PAM can be implemented with various applications without having to recompile the applications to specifically support PAM.
First this book explains how Pluggable Authentication Modules (PAM) simplify and standardize authentication in Linux. It shows in detail how PAM works and how it is configured. Then 11 common modules used across UNIX/Linux distributions are examined and explained, including all their parameters. Installation of third-party modules is discussed, and the development of new modules and PAM-aware applications is outlined
What you will learn from this book :
- Using PAM services for authentication in applications
- Using PAM modules common to various operating systems (pam_mkhomedir, pam_mount, pam_succeed_if, pam_nologin, pam_wheel, pam_access, pam_deny, pam_unix, pam_winbind, pam_ldap, pam_mysql)
- Testing and debugging your PAM configuration
- Using PAM and Winbind for integrating any Linux/UNIX computer with Microsoft Active Directory
- Developing your own PAM module in C
Approach
This book provides a practical approach to UNIX/Linux authentication. The design principles are explained thoroughly, then illustrated through the examination of popular modules. It is intended as a one-stop introduction and reference to PAM.
Who this book is written for
This book is for experienced system administrators and developers working with multiple Linux/UNIX servers or with both UNIX and Windows servers. It assumes a good level of admin knowledge, and that developers are competent in C development on UNIX-based systems.