- Pluggable Authentication Modules
- PAM OVERVIEW
- PAM Configuration
- PAM ADMINISTRATION
- PAM and Passwords
- PAM and Passwords Summary
- PAM and login
- Time and Resource Limits
- Access Control with pam_listfile
- PAM and su
- Using pam_access
- Using pam_lastlog
- Using pam_rhosts_auth
- One-Time Password Support
- PAM and the other Configuration File
- Additional PAM Options
- PAM LOGS
- AVAILABLE PAM MODULES
- PAM-AWARE APPLICATIONS
- IMPORTANT NOTES ABOUT CONFIGURING PAM
- THE FUTURE OF PAM
- SUMMARY
- FOR FURTHER READING
- On-Line Documentation
THE FUTURE OF PAM
From the contents of this chapter, it is hopefully clear that a lot of work has been done with PAM. The future is actually quite bright. The Open Software Foundation (OSF) released RFC 86.0 (RFCs are defined in Request for Comment on page 40 of Chapter 3) in October 1995 specifically for PAM. Additional work is being done to enhance the control flag option to allow system administrators to specify actions based on return codes from each module. Many of the modules noted in Table 5.15 on page 110 are under development, as is true of many of the applications listed in Table 5.16 on page 113. Given its inherent flexibility, there is no doubt that PAM will be with us for a while.