redhat-list Digest, Vol 73, Issue 20

Shankar Jha shankar.jha at gmail.com
Tue Mar 23 05:29:19 UTC 2010


Yes, you can use pam based authentication for the server/user
hardening and this is the inbuilt mechanism.

Rgds,
Shankar

On Tue, Mar 23, 2010 at 10:24 AM, ravi kumar <aravikumar48 at gmail.com> wrote:
> Dear Friend,
>
>
>  For Restriction to users and groups from Perticular Applications in Redhat
> Linux use the PAM Module. It is the inbult Module.
>
>
>
> --
> Thanks and Regards,
> A.Ravi kumar,
> Technical Eng,
> Ph: +919985085230.
> --
> redhat-list mailing list
> unsubscribe mailto:redhat-list-request at redhat.com?subject=unsubscribe
> https://www.redhat.com/mailman/listinfo/redhat-list
>




More information about the redhat-list mailing list