[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[ale] pam vs. shadow passwords
- Subject: [ale] pam vs. shadow passwords
- From: chiang at nwisgw3.ic.ornl.gov (Lisa Chiang)
- Date: Tue, 2 Feb 1999 09:13:40 -0500
Can anyone explain the difference between these two methods?
I know that Redhat uses pam to control access to xdm etc... but where is the
Suse equivalent? Does pam create encrypted user passwords like shadow or are
they mutually exclusive?
Thanks.
--
Lisa Chiang
Georgia Institute of Technology
gt6492d at gatech.campuscwix.net