PLUGGABLE AUTHENTICATION MODULES (PAM)
#1

As current authentication mechanisms evolve and as new authentication mechanisms are introduced, system entry services such as login, rlogin, and telnet must continually be customized to incorporate these changes. With the Pluggable Authentication Module (PAM) framework, multiple authentication technologies can be added without changing any of the login services, thereby preserving existing system environments. PAM can be used to integrate login services with different authentication technologies, such as RSA, DCE, Kerberos, S/Key, and smart card based authentication systems. Thus, PAM enables networked machines to exist peacefully in a heterogeneous environment, where multiple security mechanisms are in place. The PAM framework and the module interfaces provide pluggability for user authentication, as well as for account, session, and password management. login and other system-entry services can use the PAM architecture, and thus ensure that all entry points for the system have been secured.
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: turbogears authentication, semin rn pr ce o polymeryech s tvarovou pam t, rf modules, www roaldhoffman com pm modules downloads docs ferrocene pdf, external authentication modules, pluggable authentication modules pam ppt, implementation of am fm bpsk modules,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  3D PASSWORD FOR MORE SECURE AUTHENTICATION full report computer science topics 116 82,029 03-04-2014, 11:39 PM
Last Post: seminar report asees
  authentication based on IRIS RECOGNITION Computer Science Clay 2 3,024 25-02-2012, 11:08 AM
Last Post: seminar paper
  Biometrics Based Authentication Systems (Download Full Abstract And Report) computer science crazy 8 6,532 19-01-2012, 04:11 PM
Last Post: odogu
  Java Debug Hardware Modules Using JBits smart paper boy 0 1,015 18-08-2011, 02:00 PM
Last Post: smart paper boy
  Pluggable Authentication Modules (Pam) computer science crazy 3 2,531 03-04-2011, 06:08 PM
Last Post: christine
  A HARDWARE ARCHITECTURE FOR MULTIMEDIA ENCRYPTION AND AUTHENTICATION USING THE DISCR seminar class 2 14,822 19-03-2011, 03:26 PM
Last Post: seminar class
  USER AUTHENTICATION WITH TYPING PATTERN RECOGNITION seminar surveyer 6 4,736 02-02-2011, 09:34 PM
Last Post: summer project pal
  Authentication and Key Agreement (AKA) computer science crazy 3 3,509 01-02-2011, 11:44 AM
Last Post: seminar surveyer
  AKA: authentication and key agreement security protocol computer science crazy 1 3,287 25-12-2010, 09:10 PM
Last Post: science projects buddy
  USER AUTHENTICATION WITH TYPING PATTERN RECOGNITION seminar surveyer 0 1,792 20-10-2010, 05:08 PM
Last Post: seminar surveyer

Forum Jump: