Taste of Training: Understanding pluggable authentication modules (PAM)

Explore new content from the Red Hat® Server Hardening (RH413) course. Learn how pluggable authentication modules (PAM) work and how applications authenticate users with PAM.


Join us as we discuss:

  • How applications authenticate using PAM.
  • The format of PAM configuration files.
  • Adding an additional library check to the PAM configuration to track failed login attempts.

This webinar is intended for experienced system administrators interested in making configuration changes to their machines to comply with security policies.


Date: January 30, 2014

  • 11:00 EST
Length: 01:00
Language: English
Audience: Technical


Scott McBrien Curriculum manager, Red Hat

About Scott McBrien: Scott McBrien joined Red Hat in 2001 after working as a systems administrator for the National Institute of Standards and Technology. At Red Hat, he has worked on developing Red Hat Training course materials, developing the Red Hat Certified Engineer (RHCE®) and Red Hat Certified Architect (RHCA) exam programs, and as a Red Hat Consulting associate deployed into Red Hat customer environments.