Can anyone explain the difference between these two methods? I know that Redhat uses pam to control access to xdm etc... but where is the Suse equivalent? Does pam create encrypted user passwords like shadow or are they mutually exclusive? Thanks. -- Lisa Chiang Georgia Institute of Technology gt6492d at gatech.campuscwix.net