5.4.5 Installation Files
New Installation Files
Table 5-7
File
/opt/novell/ncl/bin/
delete_login_profiles
/opt/novell/ncl/bin/
login_cfg_pam
/opt/novell/ncl/bin/
login_ucfg_pam
5.5 Other Security Considerations
If root is compromised, all network access could also be compromised. For example, if a
malicious entity gets root access, it might be able to steal user credentials and authenticate to the
network with those credentials.
44
Novell Client 2.0 SP1 for Linux Administration Guide
New
Modified Description
X
Run from YaST to purge all profiles.
X
Inserts pam_ncl_autologin into PAM file.
X
Removes pam_ncl_autologin from PAM file.