找回密码
 注册
搜索
热搜: java php web
查看: 572|回复: 2

Pluggable Authentication Modules: The Definitive Guide to PAM for Linux SysAdmin

[复制链接]
发表于 2009-9-4 15:07:46 | 显示全部楼层 |阅读模式


作者:Kenneth Geisshirt
副书名:how modules work and how to implement them
出版日期:January 15, 2007
出版社:其它
页数:124
ISBN:ISBN-10: 1904811329 ISBN-13: 978-1904811329
文件格式:PDF

Product Description
A comprehensive and practical guide to PAM for Linux: how modules work and how to implement them
  • Understand and configure PAM
  • Develop PAM-aware applications and your own PAMs using the API and C
  • How to authenticate users in Active Directory, mount encrypted homedirectories, load SSH keys automatically, and restrict web and rshservices
In Detail
PAM-aware applications reduce the complexity of authentication. WithPAM you can use the same user database for every login process. PAMalso supports different authentication processes as required. Moreover,PAM is a well-defined API, and PAM-aware applications will not break ifyou change the underlying authentication configuration.
The PAM framework is widely used by most Linux distributions forauthentication purposes. Originating from Solaris 2.6 ten years ago,PAM is used today by most proprietary and free UNIX operating systemsincluding GNU/Linux, FreeBSD, and Solaris, following both the designconcept and the practical details. PAM is thus a unifying technologyfor authentication mechanisms in UNIX.
PAM is a modular and flexible authentication management layer thatsits between Linux applications and the native underlyingauthentication system. PAM can be implemented with various applicationswithout having to recompile the applications to specifically supportPAM.
What you will learn from this book?
  • Using PAM services for authentication in applications
  • Using PAM modules common to various operating systems(pam_mkhomedir, pam_mount, pam_succeed_if, pam_nologin, pam_wheel,pam_access, pam_deny, pam_unix, pam_winbind, pam_ldap, pam_mysql)
  • Testing and debugging your PAM configuration
  • Using PAM and Winbind for integrating any Linux/UNIX computer with Microsoft Active Directory
  • Developing your own PAM module in C
Approach
This book provides a practical approach to UNIX/Linuxauthentication. The design principles are explained thoroughly, thenillustrated through the examination of popular modules. It is intendedas a one-stop introduction and reference to PAM.
Who this book is written for?
This book is for experienced system administrators and developersworking with multiple Linux/UNIX servers or with both UNIX and Windowsservers. It assumes a good level of admin knowledge, and thatdevelopers are competent in C development on UNIX-based systems.
About the Author
Kenneth Geisshirt
Kenneth Geisshirt is a chemist by education, and is a strongfree-software advocate. He spent his Christmas holidays in 1992installing SLS Linux, and GNU/Linux has been his favorite operatingsystem ever since. Currently, he does consultancy work in areas likescientific computing and Linux clusters. He lives in Copenhagen,Denmark with his partner and their two children. You can find him at kenneth.geisshirt.dk/.

本帖子中包含更多资源

您需要 登录 才可以下载或查看,没有账号?注册

×
发表于 2009-11-7 13:29:59 | 显示全部楼层
感谢石头发了这么多牛X的书籍

评分

1

查看全部评分

回复

使用道具 举报

发表于 2009-11-7 13:32:02 | 显示全部楼层
感谢石头发了这么多牛X的书籍
回复

使用道具 举报

您需要登录后才可以回帖 登录 | 注册

本版积分规则

Archiver|手机版|小黑屋|软晨网(RuanChen.com)

GMT+8, 2024-11-22 23:46

Powered by Discuz! X3.5

Copyright © 2001-2023 Tencent Cloud.

快速回复 返回顶部 返回列表