Administrator's Guide

As a result, login authentication, account checking, and password modification use the
PAM interface.
Programs requiring user authentication pass their requests to PAM, which determines the
correct verification method and returns the appropriate response. The programs do not
need to know what authentication method is being used. See Figure 2-1 for an overview.
Figure 2-1 HP-UX Authentication Modules Under PAM
libpam_ntlm.1
PAM Library
libpam_krb5.1
libpam_unix.1
libpam_ldap.1libpam_dce.1
login
su
passwd telnet
UNIX DCE Kerberos
LDAP NTLM
libpam_radius.1
RADIUS
Use the PAM configuration
file, /etc/pam.conf, to indicate
which authentication module
to use.
Request for
Validation
Authentication Services
The authentication methods are specified on both a systemwide and individual user basis
using the following PAM system files:
/etc/pam.conf Systemwide control file. Defines which service modules
are to be paired with services. These are regarded as
system defaults.
/etc/pam_user.conf Individual user control file. Defines which options are to
be used by service modules on specific users. This is an
optional file.
See pam(3), pam.conf(4), pam_updbe(5), pam_user.conf(4) for more information.
2.3 Authenticating Users with PAM 35