On Thu, 21 Jan 2010 16:06:34 +0200, Nikos Chantziaras wrote:

> > I'm no expert on PAM, but I've seen it used on every linux
> > distribution that I've tried over the years. In the case I just
> > described, I used it so I can identify myself with my ssh key, which
> > is much more secure than a password. So, in general, pam is used to
> > set security policy for how users can log in, change their passwords,
> > etc. I'm not sure how I would have added ssh key authentication
> > without pam. It's a good question.  
> 
> Well, all of this is still working here without PAM, including keys 
> (I've set that option in the config file of the ssh deamon, not PAM.)

I read this that walt is using SSH keys ( on a USB stick?) for local
login, which would be best done with PAM. SSH login with keys is handled
by SSH itself.

Can you confirm walt?


-- 
Neil Bothwick

Therapy is expensive, popping bubble wrap is cheap! You choose.

Attachment: signature.asc
Description: PGP signature

Reply via email to