138
rexec
rsh
rlogin
To allow root to log in using these tools via telnet (an even worse idea but necessary in some
environments), add a few more lines:
pts/0
pts/1
7.5 Additional Resources
Much more information about PAM is available than what is covered in this chapter. Various additional
sources of information exist and will prove invaluable in helping to configure and use PAM on your
system.
7.5.1 Installed Documentation
•
pam man page — Good introductory information on PAM, including the structure and purpose
of the PAM configuration files.
•
/usr/share/doc/pam— <version-number> — Contains excellent HTML documenta-
tion on PAM, including a System Administrators' Guide, a Module Writers' Manual, and an Ap-
plication Developers' Manual. Also contains a copy of the PAM standard, DCE-RFC 86.0.
7.5.2 Useful Websites
•
http://www.kernel.org/pub/linux/libs/pam — The primary distribution website for the
Linux-PAM project, containing information on various PAM modules and applications in use or
in development, a FAQ, and additional PAM documentation.
In addition to these sources, we suggest that you read as many configuration file examples as possible
when beginning to work with PAM. Many websites offer code examples, both for administrators who
want to change default configuration files and for application developers who want to use PAM with
their programs.
Chapter 7:Pluggable Authentication Modules (PAM)
Need help?
Do you have a question about the LINUX 7.2 and is the answer not in the manual?
Questions and answers