In this session, you’ll:
- Start with a tracethrough of how Pluggable Authentication Modules authenticate users to applications.
- Make modifications to existing PAM configuration files.
- Trace through PAM authentication of a user to an application.
- Make changes to the password complexity requirements for users.
- Configure the machine to track failed log in attempts as examples of editing a PAM configuration.