version 1.1, 2013/03/09 00:00:15
|
version 1.2, 2013/03/10 02:18:51
|
Line 6 This article describes the underlying pr
|
Line 6 This article describes the underlying pr
|
*Pluggable Authentication Modules (PAM)* library, and explains how to configure |
*Pluggable Authentication Modules (PAM)* library, and explains how to configure |
PAM, how to integrate PAM into applications, and how to write PAM modules. |
PAM, how to integrate PAM into applications, and how to write PAM modules. |
|
|
See below for the license of this text. |
See on the bottom of the page for the license of this text. |
|
|
## Introduction |
## Introduction |
|
|
Line 1147 function can reasonably get.
|
Line 1147 function can reasonably get.
|
* *[linuxpam-website]: [Linux-PAM homepage](http://www.kernel.org/pub/linux/libs/pam/)*. Andrew G. Morgan. |
* *[linuxpam-website]: [Linux-PAM homepage](http://www.kernel.org/pub/linux/libs/pam/)*. Andrew G. Morgan. |
* *[solarispam-website]: [Solaris PAM homepage](http://www.sun.com/software/solaris/pam/)*. Sun Microsystems. |
* *[solarispam-website]: [Solaris PAM homepage](http://www.sun.com/software/solaris/pam/)*. Sun Microsystems. |
|
|
|
### Networks Associates Technology's license on the PAM article |
|
|
|
Copyright (c) 2001-2003 Networks Associates Technology, Inc. |
|
All rights reserved. |
|
This software was developed for the FreeBSD Project by ThinkSec AS and |
|
Network Associates Laboratories, the Security Research Division of |
|
Network Associates, Inc. under DARPA/SPAWAR contract N66001-01-C-8035 |
|
("CBOSS"), as part of the DARPA CHATS research program. |
|
Redistribution and use in source and binary forms, with or without |
|
modification, are permitted provided that the following conditions |
|
are met: |
|
1. Redistributions of source code must retain the above copyright |
|
notice, this list of conditions and the following disclaimer. |
|
2. Redistributions in binary form must reproduce the above copyright |
|
notice, this list of conditions and the following disclaimer in the |
|
documentation and/or other materials provided with the distribution. |
|
3. The name of the author may not be used to endorse or promote |
|
products derived from this software without specific prior written |
|
permission. |
|
THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS "AS IS" AND |
|
ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE |
|
IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE |
|
ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE |
|
FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL |
|
DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS |
|
OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) |
|
HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT |
|
LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY |
|
OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF |
|
SUCH DAMAGE. |