[Date Prev][Date Next]   [Thread Prev][Thread Next]   [Thread Index] [Date Index] [Author Index]

Re: redhat-list Digest, Vol 73, Issue 20



Yes, you can use pam based authentication for the server/user
hardening and this is the inbuilt mechanism.

Rgds,
Shankar

On Tue, Mar 23, 2010 at 10:24 AM, ravi kumar <aravikumar48 gmail com> wrote:
> Dear Friend,
>
>
>  For Restriction to users and groups from Perticular Applications in Redhat
> Linux use the PAM Module. It is the inbult Module.
>
>
>
> --
> Thanks and Regards,
> A.Ravi kumar,
> Technical Eng,
> Ph: +919985085230.
> --
> redhat-list mailing list
> unsubscribe mailto:redhat-list-request redhat com?subject=unsubscribe
> https://www.redhat.com/mailman/listinfo/redhat-list
>



[Date Prev][Date Next]   [Thread Prev][Thread Next]   [Thread Index] [Date Index] [Author Index]