Working with PAM

In this session, you’ll:

  • Start with a tracethrough of how Pluggable Authentication Modules authenticate users to applications.
  • Make modifications to existing PAM configuration files.
  • Trace through PAM authentication of a user to an application.
  • Make changes to the password complexity requirements for users.
  • Configure the machine to track failed log in attempts as examples of editing a PAM configuration.