Managing Kerberos and Other Authentication Services in Oracle® Solaris 11.2

Exit Print View

Updated: August 2014

Configuring PAM

You can use PAM as is. This section gives examples of PAM configurations that are not in effect by default.

Table 1-1  PAM Task Map
For Instructions
Plan for your PAM installation.
Covers how to plan customizing PAM for your site.
Assign a new PAM policy to a user.
Customizes per-user authentication requirements for multiple services.
Create users with encrypted home directories.
Modifies a PAM stack to enable the creation of encrypted home directories.
Add new PAM modules.
Explains how to install and test customized PAM modules.
Assign a non-default PAM policy to users.
Shows how to add a PAM policy to a rights profile for assignment to a range of users at sites that use Kerberos, LDAP, or a combination of logins.
Assign a non-default PAM policy to users.
Distributes customized PAM stacks to all system images.
Initiate error logging.
Logs PAM error messages through syslog.
Troubleshoot PAM errors.
Provides steps to locate, solve, and test PAM misconfigurations.