Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Pluggable Authentication Modules (Pam)
Post: #1

As current authentication mechanisms evolve and as new authentication mechanisms are introduced, system entry services such as login, rlogin, and telnet must continually be customized to incorporate these changes.

With the Pluggable Authentication Module (PAM) framework, multiple authentication technologies can be added without changing any of the login services, thereby preserving existing system environments. PAM can be used to integrate login services with different authentication technologies, such as RSA, DCE, Kerberos, S/Key, and smart card based authentication systems.

Thus, PAM enables networked machines to exist peacefully in a heterogeneous environment, where multiple security mechanisms are in place. The PAM framework and the module interfaces provide pluggability for user authentication, as well as for account, session, and password management. login and other system-entry services can use the PAM architecture, and thus ensure that
Post: #2

Can I pls get more info about the project? I need to give a technical seminars at college.


Post: #3
PAM, is a mechanism to integrate multiple low-level authentication schemes into a high-level application programming interface (API). PAM can do many things for you but the primary focus is to authenticate your users. It also allows to set up the environment the users will work in. a user name and a password has to be provided by the user to authenticate himself and gain access to the system.

Need for PAM
PAM and PAM-aware applications reduce the complexity of authentication. With the use of PAM, the system administrator can choose to use the same user database for every login process of your system. PAM has a well defined API so that the PAM dependent appliations will not crash even when the system administrator changes the underlying settings for the PAM. PAM can be taken advantage of by the application programmers if their application requires some kind of authentication. In this case, much less programming is involved and you don't have to write a complete set of authentication functions. appropriate back end to store user names and passwords can be chosen by the system administrator.

Get the details here:
Post: #4
I finished preparing the report. I have uploaded the file so that someone else can use it for a technical seminars.

thank you.

Important Note..!

If you are not satisfied with above reply ,..Please


So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: pluggable authentication, sample online training modules, modules of technical education manager, who is pam st clement, authentication credentials, modules in matrimony project, modules used for payslip,

Quick Reply
Type your reply to this message here.

Image Verification
Image Verification
(case insensitive)
Please enter the text within the image on the left in to the text box below. This process is used to prevent automated posts.

Possibly Related Threads...
Thread: Author Replies: Views: Last Post
  3D PASSWORD FOR MORE SECURE AUTHENTICATION full report computer science topics 116 67,049 03-04-2014 11:39 PM
Last Post: seminar report asees
  authentication based on IRIS RECOGNITION Computer Science Clay 2 2,541 25-02-2012 11:08 AM
Last Post: seminar paper
  Biometrics Based Authentication Systems (Download Full Abstract And Report) computer science crazy 8 5,508 19-01-2012 04:11 PM
Last Post: odogu
  Java Debug Hardware Modules Using JBits smart paper boy 0 610 18-08-2011 02:00 PM
Last Post: smart paper boy
Last Post: seminar class
  USER AUTHENTICATION WITH TYPING PATTERN RECOGNITION seminar surveyer 6 3,807 02-02-2011 09:34 PM
Last Post: summer project pal
  Authentication and Key Agreement (AKA) computer science crazy 3 2,973 01-02-2011 11:44 AM
Last Post: seminar surveyer
  AKA: authentication and key agreement security protocol computer science crazy 1 2,797 25-12-2010 09:10 PM
Last Post: science projects buddy
  USER AUTHENTICATION WITH TYPING PATTERN RECOGNITION seminar surveyer 0 1,342 20-10-2010 05:08 PM
Last Post: seminar surveyer
  Practical Password-Based Two-Server Authentication and Key Exchange System computer science topics 0 962 01-07-2010 03:52 PM
Last Post: computer science topics