[EMAIL PROTECTED] (Adam P. Harris) writes:
> Norbert Veber <[EMAIL PROTECTED]> writes:
> > What sorts of things can pam do? I only know that for example a
> > long program that uses PAM works regardless of weather the
> > password file is shadowed or not, but can it do more advanced
> > authenti
Norbert Veber <[EMAIL PROTECTED]> writes:
> What sorts of things can pam do? I only know that for example a long
> program that uses PAM works regardless of weather the password file is
> shadowed or not, but can it do more advanced authentication, ie. could it be
> used to replace radius?
PAM, a
Ugh, this doesnt make sense the way it is.. :)
> What sorts of things can pam do? I only know that for example a long
^login
> program that uses PAM works regardless of weather the password file is
> shadowed or not, but can it do
[EMAIL PROTECTED] (Adam P. Harris) writes:
> [EMAIL PROTECTED] (Gregory S. Stark) writes:
> > I asked once earlier, but no one responded:
> > Does anyone know how PAM modules should be packaged?
> Gregory, I'm sorry I cannot provide good technical information. I do
> know that we had backed ou
On Sun, Jun 21, 1998 at 07:09:30PM -0400, Adam P. Harris wrote:
> [EMAIL PROTECTED] (Gregory S. Stark) writes:
>
> > I asked once earlier, but no one responded:
> > Does anyone know how PAM modules should be packaged?
>
> Gregory, I'm sorry I cannot provide good technical information. I do
> kn
[EMAIL PROTECTED] (Gregory S. Stark) writes:
> I asked once earlier, but no one responded:
> Does anyone know how PAM modules should be packaged?
Gregory, I'm sorry I cannot provide good technical information. I do
know that we had backed out PAM-ifying hamm sometime last year. I
think we shou
6 matches
Mail list logo