World is Welcome To The World of Linux

Journey into the world of linux

Menu
  • About
  • Welcome
Menu

Linux Security: PAM an Introduction

Posted on June 18, 2010 by Ganesh Sharma

If you're new here, you may want to subscribe to my RSS feed. Thanks for visiting!

Linux Security is greatly enhanced if authentication to the system is well under control. PAM plays a great role in this process. PAM expands to Pluggable Authentication Modules. I promise to explain PAM in as easy manner as I can. Just be ready to read forwards and you are done. Since the blog is tightly focussed on security of unix based system, so I assume the general basic knowledge of unix based operating systems.

What is PAM

PAM are a set of shared libraries using which the administrators can choose how to authenticate the users. PAM has been designed in such a way that the modules can be used with many types of applications. So PAM modules are separate and applications are separate. Whenever an application wants to authenticate the user, it contacts PAM, which in turn completes the authentication process for the application. So, you can say that the application outsources its job of authentication to PAM. Great for linux secuity.

The example applications are ssh, pop, imap and several others.

What Does PAM Apply To

The PAM libraries apply to mainly console based applications. Any applications which can be accessed via console, are able to access PAM in most of the cases.

PAM Aware Applications

PAM is just a system having a set of shared libraries which can do the job of authentication for an application like ssh. So, if any application wants to authenticate the users via PAM, it can use PAM modules(functions) to ask for user authentication. In that way application authentication can be done without any change in the application. The applications which use PAM shared libraries for authenticaing the user, are also called PAM Aware Applications.

What Are The Possible Uses of PAM

PAM libraries can be used in various scenarios. The listing is povided here for ready reference:

  1. Enforcing password length for the user account. The file /etc/pam.d/system-auth is used for this purpose.
  2. To disable the access to the console programs for all general users. The examples are halt, reboot etc. If you disable these programs from console, general users can not use the programs from the console. /etc/security/console.apps/{service_names} can be used to block access to certain programs from console.
  3. Disabling access to the console itself. /etc/pam.d/pam_console.so is used for this purpose.
  4. We can control who can login to the system. /etc/security/access.conf is used for this purpose.
  5. Limiting user permissions under the console. /etc/pam.d/pam_console.so is used for this purpose.
  6. You can set limits on the resources which the users can use while accessing the system through console. /etc/security/limits.conf is used for this purpose.
  7. You can fully control when and which applications can be accessed through the console. You can set the times when a user can connect to a particular application via console. /etc/security/time.conf is used for this purpose.
  8. You can block the su command to certain or all users. So whosoever is blocked, can not use su command to become another user. /etc/pam.d/su is used for this purpose.

The list goes on and on. I’ll be expanding the discussion to PAM in later articles for linux security. Keep visiting and reading. You may like to bookmark this site for preventing yourself from loosing any important articles of your interest in security domain. Otherwise please signup for the newsletter and you’ll get articles via mail too.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recent Posts

  • Date Command Tutorial(Video)
  • grep Command Tutorial – 1(Video)
  • Introduction To ls Command(Video)
  • Chapter 3
  • Set Position Of Poll Module Into Joomla

Recent Comments

  • Kansas City Trailer Proz on Physical Volume In AIX – A Primer
  • Create volume group in AIX | myunixsheet on How To Create Volume Group
  • Restore of AIX backup on other Unix system - TecHub on What is mksysb And What Are Its Components
  • Firewall Unleashed - InfoSec Institute on Packet Filtering Firewall: An Introduction
  • Manwendra on Proxy Firewall and Gateway Firewall: Introduction

Archives

  • January 2019
  • June 2010
  • May 2010
  • February 2010
  • May 2009
  • April 2009
  • March 2009
  • February 2009
  • January 2009
  • December 2008
  • November 2008

Categories

  • 30 Days To Joomla WebSite Setup
  • A Journey To The World of Linux System Administration
  • Aix
  • Backups
  • Books
  • Firewalls
  • Introduction
  • Joomla
  • Joomla Backup
  • Joomla Web Technology
  • Linux
  • LPAR and Virtualization
  • LVM
  • Pluggable Authentication Modules
  • section navigator pro
  • Security
  • Security Knowledge Base
  • Tips and Tricks
  • Uncategorized
  • World is Welcome Products

Meta

  • Log in
  • Entries RSS
  • Comments RSS
  • WordPress.org
©2023 World is Welcome To The World of Linux | WordPress Theme by SuperbThemes