[ale] pam vs. shadow passwords

Lisa Chiang chiang at nwisgw3.ic.ornl.gov
Tue Feb 2 09:31:00 EST 1999


Can anyone explain the difference between these two methods?

I know that Redhat uses pam to control access to xdm etc... but where is the
Suse equivalent? Does pam create encrypted user passwords like shadow or are
they mutually exclusive?

Thanks.

--
Lisa Chiang
Georgia Institute of Technology
gt6492d at gatech.campuscwix.net






More information about the Ale mailing list