Red Hat Linux 7.1: The Official Red Hat Linux Reference Guide | ||
---|---|---|
Prev | Chapter 8. Pluggable Authentication Modules (PAM) | Next |
If you are using shadow passwords, pam_unix.so will automatically detect that they are in use and will use them to authenticate users.
Please refer to the section called Shadow Utilities in Chapter 12 for more information on shadow passwords.