|
Task |
Description |
For Instructions |
|---|---|---|
|
Plan for your PAM installation. |
Consider configuration issues and make decisions about them before you start the software configuration process. | |
|
Add new PAM modules. |
Sometimes, site-specific modules must be written and installed to cover requirements that are not part of the generic software. This procedure explains how to install these new PAM modules. | |
|
Block access through ~/.rhosts. |
Further increase security by preventing access through ~/.rhosts. |
How to Prevent Rhost-Style Access From Remote Systems With PAM |
|
Initiate error logging. |
Start the logging of PAM error messages through syslog. |