What are some of the benefits of using pluggable authentication modules?

What will be an ideal response?


PAM divides authentication into the authentication interface library, and the actual authentication mechanism-specific modules. Applications write to the PAM interface, while the authentication system providers write to the PAM network interface that is independent of application. This separation of concern permits applications to remain independent from underlying authentication technologies. New and updated authentication technologies can be plugged in under an application without requiring modifications to the application itself.

Computer Science & Information Technology

You might also like to view...

Given the following structure decaration, Employee is

``` struct Employee { string name; int idNum; }; ``` a. a member b. an array c. a tag d. None of these

Computer Science & Information Technology

Review the ways in which PowerPoint allows you to view a presentation.

What will be an ideal response?

Computer Science & Information Technology

You are configuring four 120 GB drives in a RAID 5 array. How much space will be available?

A. 300 GB B. 400 GB C. 480 GB D. 360 GB

Computer Science & Information Technology

A sentence is in passive voice when its subject receives the action performed by the verb.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology