ALE'ers -
I understand PAM can run shadow passwords without requiring a set of apps
built for this, but I've stubbed my toe once or twice trying to use it.
I'ld appreciate a few hints on converting a RH6.1 box.
Also, I notice in the /etc/pam.d a number of files like 'rsh' and 'rlogin'
which probably correspond to services I don't want. Any comments or
RTFM-pointers on configuration would be good (somewhere in
/usr/doc/pam-0.68/*, presumably).
TIA -
John Mills
Sr. Software Engineer
TGA Technologies, Inc.
100 Pinnacle Way, Suite 140
Norcross, GA 30071-3633
e-mail: ">jmills@tga.com
Phone: 770-441-2100 ext.124 (voice)
770-449-7740 (FAX)
--
To unsubscribe: mail ">majordomo@ale.org with "unsubscribe ale" in message body.