Task |
Description |
For Instructions |
---|---|---|
Plan for your PAM installation. |
Consider configuration issues and make decisions about them before you start the software configuration process. | |
Add new PAM modules. |
Sometimes, site-specific modules must be written and installed to cover requirements that are not part of the generic software. This procedure explains how to install these new PAM modules. | |
Block access through ~/.rhosts. |
Further increase security by preventing access through ~/.rhosts. |
How to Prevent Rhost-Style Access From Remote Systems With PAM |
Initiate error logging. |
Start the logging of PAM error messages through syslog. |