𝔖 Scriptorium
✦   LIBER   ✦

πŸ“

Pluggable Authentication Modules: The Definitive Guide to PAM for Linux SysAdmins and C Developers: A comprehensive and practical guide to PAM for Linux: how modules work and how to implement them

✍ Scribed by Kenneth Geisshirt


Publisher
Packt Publishing
Year
2007
Tongue
English
Leaves
118
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


I did not gain anymore insight from this book than I already had from reading MAN pages and briefly researching on-line. The first 25 pages are basically history, file structure and an introduction with tips on how to compile from source. The other 75 pages are shallow descriptions of various modules, dumbed down examples so things don't get to complicated, and a short section that talks about development. There is absolutely no depth and very little useful information. I can't believe this is called a "definitive guide". If your work as a system administrator has brought you to considering this book chances are you probably already know more about PAM than you will gain from this book. I gave it one star because it is thin, lightweight, and it uses nice big fonts.

✦ Table of Contents


Pluggable Authentication Modules: The Definitive Guide to PAM for Linux SysAdmins and C Developers......Page 1
Table of Contents......Page 8
Preface......Page 11
History of PAM......Page 17
PAM Solves the Authentication Problem......Page 18
Installing Linux PAM......Page 19
Compiling......Page 20
PAM Implementations......Page 22
Summary......Page 24
PAM File System Layout......Page 25
The PAM Framework......Page 27
Online Documentation......Page 29
Services......Page 30
Management Groups......Page 32
The Auth Group......Page 33
The Account Group......Page 34
The Password Group......Page 35
Control Flags......Page 36
Sufficient......Page 37
Order matters......Page 38
Consolidating Your PAM Configuration......Page 39
An Example......Page 42
Summary......Page 45
Where to Test?......Page 47
Leaving a Back Door Open......Page 48
Test Cases......Page 49
Enabling Logging......Page 50
Reading the Log......Page 52
The pamtester Utility......Page 54
Automating PAM Tests......Page 56
Bad Example......Page 57
Summary......Page 59
Parameters......Page 61
debug......Page 62
use_first_pass......Page 63
expose_account......Page 65
pam_mkhomedir......Page 66
pam_mount......Page 67
pam_succeed_if......Page 68
pam_nologin......Page 69
pam_access......Page 70
pam_deny......Page 71
pam_unix......Page 72
pam_ldap......Page 73
pam_mysql......Page 74
Summary......Page 75
Encrypted Home Directories......Page 77
Working with Secure Shell......Page 78
Apache htaccess Made Smart......Page 81
Directory Services......Page 82
Overview......Page 83
Winbind Configuration......Page 85
Kerberos......Page 86
Joining the Directory......Page 87
Finally PAM......Page 88
LDAP......Page 90
The LDAP Client......Page 91
PAM Configuration......Page 92
Limiting r-Services......Page 93
Limiting Resources......Page 95
Summary......Page 97
PAM-aware Applications......Page 99
Opening and Closing a PAM Session......Page 101
Authenticating the User......Page 102
Manipulating the PAM Handling Data Structure......Page 103
Conversation Functions......Page 104
Developing your Own PAM Modules......Page 105
The Management Groups......Page 106
Return Codes......Page 107
Supporting Functions......Page 108
Compiling......Page 109
Summary......Page 110
Vault – Secure Database......Page 111
The ssh_tunnels Module......Page 113
Index......Page 117

✦ Subjects


Π‘ΠΈΠ±Π»ΠΈΠΎΡ‚Π΅ΠΊΠ°;ΠšΠΎΠΌΠΏΡŒΡŽΡ‚Π΅Ρ€Π½Π°Ρ Π»ΠΈΡ‚Π΅Ρ€Π°Ρ‚ΡƒΡ€Π°;Linux / Unix;


πŸ“œ SIMILAR VOLUMES


Pluggable Authentication Modules: The De
✍ Kenneth Geisshirt πŸ“‚ Library πŸ“… 2007 πŸ› Packt Publishing 🌐 English

First this book explains how Pluggable Authentication Modules (PAM) simplify and standardize authentication in Linux. It shows in detail how PAM works and how it is configured. Then 11 common modules used across UNIX/Linux distributions are examined and explained, including all their parameters. Ins

Pluggable Authentication Modules: The De
✍ Kenneth Geisshirt πŸ“‚ Library πŸ“… 2007 πŸ› Packt Publishing 🌐 English

PAM-aware applications reduce the complexity of authentication. With PAM you can use the same user database for every login process. PAM also supports different authentication processes as required. Moreover, PAM is a well-defined API, and PAM-aware applications will not break if you change the unde

Linux Kernel Programming: A comprehensiv
✍ Kaiwan N. Billimoria πŸ“‚ Library πŸ“… 2024 πŸ› Packt Publishing 🌐 English

<p><span>Gain both a firm practical understanding and sufficient theoretical insight into the inner workings of Linux kernel internals, learn to write high-quality kernel module code, understand the complexities of kernel synchronization</span></p><p><span>Purchase of the print or Kindle book includ

Linux Kernel Programming: A comprehensiv
✍ Kaiwan N. Billimoria πŸ“‚ Library πŸ“… 2024 πŸ› Packt Publishing 🌐 English

<div class="books-expander-content" aria-expanded="true"> <p><span class="a-text-bold">Gain both a firm practical understanding and sufficient theoretical insight into the inner workings of Linux kernel internals, learn to write high-quality kernel module code, understand the co

Linux Kernel Programming: A comprehensiv
✍ Kaiwan N. Billimoria πŸ“‚ Library πŸ“… 2024 πŸ› Packt Publishing 🌐 English

<div class="books-expander-content" aria-expanded="true"> <p><span class="a-text-bold">Gain both a firm practical understanding and sufficient theoretical insight into the inner workings of Linux kernel internals, learn to write high-quality kernel module code, understand the co