Pluggable Authentication Modules Administration

Pluggable Authentication Modules (PAM) provides a flexible and dynamic mechanism for authenticating any application or service. The PAM model removes the authentication process from being hardwired within each application through independent configuration files for each application or service. This course explains how to configure the PAM files for authentication of services and applications that are PAM-aware. The student will learn how to administer the PAM configuration files and modules for individual services. The functionality of various PAM modules will be explained so the administrator can select and alter their use.

STUDENTS ENROLLED

    • Overview of PAM
    • PAM documentation
      • On-line
      • www.kernel.org
    • PAM structure
      • On-line
    • PAM modules
      • Common modules
      • Others
    • PAM configuration files and syntax
      • Module-type
      • Control-flag
      • Module-path
      • Arguments
    • Modifying advanced configuration files
      • access.conf
      • group.conf
      • limits.conf
      • pam_env.conf
      • time.conf
    • Investigation of typical configurations
      • system-authi
      • login
      • ssh
    • Testing and troubleshooting

    Any administrator that is responsible for the authentication of PAM-aware applications and services on their system.

    • U101 – Introduction to Unix/Linux

    The administrator will be able to create and/or modify PAM configurations for PAM-aware applications and services that reflect the level and detail of authentication required by their company.

    • PC Workstation for use during training
    • Student Manual

    • U301 – Linux System Administration (Server)

    Course Reviews

    N.A

    ratings
    • 5 stars0
    • 4 stars0
    • 3 stars0
    • 2 stars0
    • 1 stars0

    No Reviews found for this course.

    © Euler. All rights reserved.
    X
    Contact Us to Register