Taste of Training: Understanding pluggable authentication modules (PAM)

Explore new content from the Red Hat® Server Hardening (RH413) course. Learn how pluggable authentication modules (PAM) work and how applications authenticate users with PAM.

More

Join us as we discuss:

  • How applications authenticate using PAM.
  • The format of PAM configuration files.
  • Adding an additional library check to the PAM configuration to track failed login attempts.

This webinar is intended for experienced system administrators interested in making configuration changes to their machines to comply with security policies.

Less

Date: January 30, 2014

Time:
  • 11:00 EST
Length: 01:00
Language: English
Audience: Technical

Speaker(s):

Scott McBrien Curriculum manager, Red Hat

About Scott McBrien: Scott McBrien joined Red Hat in 2001 after working as a systems administrator for the National Institute of Standards and Technology. At Red Hat, he has worked on developing Red Hat Training course materials, developing the Red Hat Certified Engineer (RHCE®) and Red Hat Certified Architect (RHCA) exam programs, and as a Red Hat Consulting associate deployed into Red Hat customer environments.