What are some of the benefits of using pluggable authentication modules?

What will be an ideal response?


PAM divides authentication into the authentication interface library, and the actual authentication mechanism-specific modules. Applications write to the PAM interface, while the authentication system providers write to the PAM network interface that is independent of application. This separation of concern permits applications to remain independent from underlying authentication technologies. New and updated authentication technologies can be plugged in under an application without requiring modifications to the application itself.

Computer Science & Information Technology

You might also like to view...

Assume that you have a document with many subsections. Write the HTML markup to create a frame with a table of contents on the left side of the window, and have each entry in the table of contents use internal linking to scroll down the document frame to the appropriate subsection.

What will be an ideal response?

Computer Science & Information Technology

Standalone video cameras provide better quality video than the video mode on your cell phone

Indicate whether the statement is true or false

Computer Science & Information Technology

The ability to create multiple appearances for one object plays a big role in interactive websites and other digital publications.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Research has shown that people will wait an average of ____ seconds for a page to load before surfing away to a different site.

A. 4 B. 8 C. 12 D. 16

Computer Science & Information Technology