Pluggable Authentication Modules: The Definitive Guide to PAM for Linux SysAdmins and C Developers

A comprehensive and practical guide to PAM for Linux: how modules work and how to implement them

Pluggable Authentication Modules: The Definitive Guide to PAM for Linux SysAdmins and C Developers

Progressing
Kenneth Geisshirt

A comprehensive and practical guide to PAM for Linux: how modules work and how to implement them
$11.99
$19.99
RRP $11.99
RRP $19.99
eBook
Print + eBook
$29.99 p/month

Subscribe Now

Download this title FREE and instantly access over 3,500 courses today!

With unlimited access to a constantly growing library of over 3,500 courses, a subscription to Mapt gives you everything you need to get that next promotion or to land that dream job. Cancel anytime.

Code Files
+ Collection
Free Sample

Book Details

ISBN 139781904811329
Paperback124 pages

Book Description

PAM-aware applications reduce the complexity of authentication. With PAM you can use the same user database for every login process. PAM also supports different authentication processes as required. Moreover, PAM is a well-defined API, and PAM-aware applications will not break if you change the underlying authentication configuration.

The PAM framework is widely used by most Linux distributions for authentication purposes. Originating from Solaris 2.6 ten years ago, PAM is used today by most proprietary and free UNIX operating systems including GNU/Linux, FreeBSD, and Solaris, following both the design concept and the practical details. PAM is thus a unifying technology for authentication mechanisms in UNIX.

PAM is a modular and flexible authentication management layer that sits between Linux applications and the native underlying authentication system. PAM can be implemented with various applications without having to recompile the applications to specifically support PAM.

Table of Contents

Chapter 1: Introduction to PAM
History of PAM
PAM Solves the Authentication Problem
Need for PAM
Installing Linux-PAM
PAM Implementations
Summary
Chapter 2: Theory of Operation
PAM File System Layout
The PAM Framework
Online Documentation
Services
Management Groups
Stacking
Control Flags
Consolidating Your PAM Configuration
Securing Your Environment
Summary
Chapter 3: Testing and Debugging
Where to Test?
Leaving a Back Door Open
Test Cases
Getting Backstage
The pamtester Utility
Automating PAM Tests
Bad Example
Summary
Chapter 4: Common Modules
Parameters
Modules Related to User Environments
Modules Used to Restrict Access
Modules Related to Back-End Storage
Summary
Chapter 5: Recipes
Encrypted Home Directories
Working with Secure Shell
Apache htaccess Made Smart
Directory Services
Limiting r-Services
Limiting Resources
Summary
Chapter 6: Developing with PAM
PAM-aware Applications
Developing your Own PAM Modules
Summary

What You Will Learn

  • Using PAM services for authentication in applications
  • Using PAM modules common to various operating systems (pam_mkhomedir, pam_mount, pam_succeed_if, pam_nologin, pam_wheel, pam_access, pam_deny, pam_unix, pam_winbind, pam_ldap, pam_mysql)
  • Testing and debugging your PAM configuration
  • Using PAM and Winbind for integrating any Linux/UNIX computer with Microsoft Active Directory
  • Developing your own PAM module in C

Authors

Table of Contents

Chapter 1: Introduction to PAM
History of PAM
PAM Solves the Authentication Problem
Need for PAM
Installing Linux-PAM
PAM Implementations
Summary
Chapter 2: Theory of Operation
PAM File System Layout
The PAM Framework
Online Documentation
Services
Management Groups
Stacking
Control Flags
Consolidating Your PAM Configuration
Securing Your Environment
Summary
Chapter 3: Testing and Debugging
Where to Test?
Leaving a Back Door Open
Test Cases
Getting Backstage
The pamtester Utility
Automating PAM Tests
Bad Example
Summary
Chapter 4: Common Modules
Parameters
Modules Related to User Environments
Modules Used to Restrict Access
Modules Related to Back-End Storage
Summary
Chapter 5: Recipes
Encrypted Home Directories
Working with Secure Shell
Apache htaccess Made Smart
Directory Services
Limiting r-Services
Limiting Resources
Summary
Chapter 6: Developing with PAM
PAM-aware Applications
Developing your Own PAM Modules
Summary

Book Details

ISBN 139781904811329
Paperback124 pages
Read More

Read More Reviews