Re: redhat-list Digest, Vol 73, Issue 20

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Yes, you can use pam based authentication for the server/user
hardening and this is the inbuilt mechanism.

Rgds,
Shankar

On Tue, Mar 23, 2010 at 10:24 AM, ravi kumar <aravikumar48@xxxxxxxxx> wrote:
> Dear Friend,
>
>
>  For Restriction to users and groups from Perticular Applications in Redhat
> Linux use the PAM Module. It is the inbult Module.
>
>
>
> --
> Thanks and Regards,
> A.Ravi kumar,
> Technical Eng,
> Ph: +919985085230.
> --
> redhat-list mailing list
> unsubscribe mailto:redhat-list-request@xxxxxxxxxx?subject=unsubscribe
> https://www.redhat.com/mailman/listinfo/redhat-list
>

-- 
redhat-list mailing list
unsubscribe mailto:redhat-list-request@xxxxxxxxxx?subject=unsubscribe
https://www.redhat.com/mailman/listinfo/redhat-list


[Index of Archives]     [CentOS]     [Kernel Development]     [PAM]     [Fedora Users]     [Red Hat Development]     [Big List of Linux Books]     [Linux Admin]     [Gimp]     [Asterisk PBX]     [Yosemite News]     [Red Hat Crash Utility]


  Powered by Linux