X7ROOT File Manager
Current Path:
/usr/share/doc/pam-devel-1.1.8/html
usr
/
share
/
doc
/
pam-devel-1.1.8
/
html
/
๐
..
๐
Linux-PAM_ADG.html
(8.41 KB)
๐
Linux-PAM_MWG.html
(8.59 KB)
๐
adg-author.html
(3.02 KB)
๐
adg-copyright.html
(3.54 KB)
๐
adg-example.html
(3.59 KB)
๐
adg-files.html
(2.18 KB)
๐
adg-glossary.html
(3.21 KB)
๐
adg-interface-by-app-expected.html
(61.01 KB)
๐
adg-interface-of-app-expected.html
(8.26 KB)
๐
adg-interface-programming-notes.html
(2.55 KB)
๐
adg-interface.html
(4.9 KB)
๐
adg-introduction-description.html
(3.29 KB)
๐
adg-introduction-synopsis.html
(2.62 KB)
๐
adg-introduction.html
(2.01 KB)
๐
adg-libpam-functions.html
(13.13 KB)
๐
adg-libpam_misc.html
(3.34 KB)
๐
adg-overview.html
(8.16 KB)
๐
adg-porting.html
(4.2 KB)
๐
adg-security-conv-function.html
(2.29 KB)
๐
adg-security-library-calls.html
(3.13 KB)
๐
adg-security-resources.html
(2.83 KB)
๐
adg-security-service-name.html
(4.43 KB)
๐
adg-security-user-identity.html
(5.38 KB)
๐
adg-security.html
(3.73 KB)
๐
adg-see-also.html
(2.16 KB)
๐
mwg-author.html
(3 KB)
๐
mwg-copyright.html
(3.52 KB)
๐
mwg-example.html
(1.96 KB)
๐
mwg-expected-by-module-item.html
(45.36 KB)
๐
mwg-expected-by-module-other.html
(8.15 KB)
๐
mwg-expected-by-module.html
(4.02 KB)
๐
mwg-expected-of-module-acct.html
(6.05 KB)
๐
mwg-expected-of-module-auth.html
(10.73 KB)
๐
mwg-expected-of-module-chauthtok.html
(7.8 KB)
๐
mwg-expected-of-module-overview.html
(6.28 KB)
๐
mwg-expected-of-module-session.html
(6.98 KB)
๐
mwg-expected-of-module.html
(4.27 KB)
๐
mwg-introduction-description.html
(3.88 KB)
๐
mwg-introduction-synopsis.html
(1.98 KB)
๐
mwg-introduction.html
(1.98 KB)
๐
mwg-see-also.html
(2.18 KB)
๐
mwg-see-options.html
(2.92 KB)
๐
mwg-see-programming-libs.html
(2.94 KB)
๐
mwg-see-programming-sec.html
(8.92 KB)
๐
mwg-see-programming-syslog.html
(4.63 KB)
๐
mwg-see-programming.html
(3 KB)
Editing: adg-glossary.html
<html><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8"><title>Chapterย 7.ย Glossary of PAM related terms</title><meta name="generator" content="DocBook XSL Stylesheets V1.78.1"><link rel="home" href="Linux-PAM_ADG.html" title="The Linux-PAM Application Developers' Guide"><link rel="up" href="Linux-PAM_ADG.html" title="The Linux-PAM Application Developers' Guide"><link rel="prev" href="adg-porting.html" title="Chapterย 6.ย Porting legacy applications"><link rel="next" href="adg-example.html" title="Chapterย 8.ย An example application"></head><body bgcolor="white" text="black" link="#0000FF" vlink="#840084" alink="#0000FF"><div class="navheader"><table width="100%" summary="Navigation header"><tr><th colspan="3" align="center">Chapterย 7.ย Glossary of PAM related terms</th></tr><tr><td width="20%" align="left"><a accesskey="p" href="adg-porting.html">Prev</a>ย </td><th width="60%" align="center">ย </th><td width="20%" align="right">ย <a accesskey="n" href="adg-example.html">Next</a></td></tr></table><hr></div><div class="chapter"><div class="titlepage"><div><div><h1 class="title"><a name="adg-glossary"></a>Chapterย 7.ย Glossary of PAM related terms</h1></div></div></div><p> The following are a list of terms used within this document. </p><div class="variablelist"><dl class="variablelist"><dt><span class="term">Authentication token</span></dt><dd><p> Generally, this is a password. However, a user can authenticate him/herself in a variety of ways. Updating the user's authentication token thus corresponds to <span class="emphasis"><em>refreshing</em></span> the object they use to authenticate themself with the system. The word password is avoided to keep open the possibility that the authentication involves a retinal scan or other non-textual mode of challenge/response. </p></dd><dt><span class="term">Credentials</span></dt><dd><p> Having successfully authenticated the user, PAM is able to establish certain characteristics/attributes of the user. These are termed <span class="emphasis"><em>credentials</em></span>. Examples of which are group memberships to perform privileged tasks with, and <span class="emphasis"><em>tickets</em></span> in the form of environment variables etc. . Some user-credentials, such as the user's UID and GID (plus default group memberships) are not deemed to be PAM-credentials. It is the responsibility of the application to grant these directly. </p></dd></dl></div></div><div class="navfooter"><hr><table width="100%" summary="Navigation footer"><tr><td width="40%" align="left"><a accesskey="p" href="adg-porting.html">Prev</a>ย </td><td width="20%" align="center">ย </td><td width="40%" align="right">ย <a accesskey="n" href="adg-example.html">Next</a></td></tr><tr><td width="40%" align="left" valign="top">Chapterย 6.ย Porting legacy applicationsย </td><td width="20%" align="center"><a accesskey="h" href="Linux-PAM_ADG.html">Home</a></td><td width="40%" align="right" valign="top">ย Chapterย 8.ย An example application</td></tr></table></div></body></html>
Upload File
Create Folder