Is PAM really the best choice for secure user authentication?
Red Hat Enterprise Linux Red Hat Enterprise Linux
17.2K subscribers
546 views
29

 Published On Oct 21, 2024

Join us as we delve into the intricate world of PAM (Pluggable Authentication Modules) and its role in securing user authentication. Learn the rules of login authentication, various PAM rules (Auth, Account, Password, Session), and severity levels like Required and Optional. Understand the significance of system configurations, authentication methods like LDAP, local user accounts, and integrating PAM for two-factor authentication. This in-depth session helps you easily navigate PAM configurations and avoid common pitfalls while enhancing system security.

Watch the full episode here: https://youtube.com/live/eLFaHclixdI

- - - -

Critical Administration Skills for Red Hat Enterprise Linux: Whether you are new to Linux or new to RHEL, join our hosts for a hands-on look into the commands and processes, ask questions, and grow your knowledge.

Get Started with Red Hat Enterprise Linux: https://developers.redhat.com/register
Try it for yourself: https://redhat.com/interactive-labs
Join our Discord: https://red.ht/rhel-discord

Nate Lager:   / gangrif  
Scott McBrien:   / scott-mcbrien-349b356  

Integrating RHEL systems directly with Windows Active Directory
https://docs.redhat.com/en/documentat...

Manage user basics
https://www.redhat.com/en/interactive...

Commands used:
usermod, mkpasswd, openssl, chage, umask,

00:00 Understanding PAM and Login Rules
01:47 Types of PAM Rules and Their Severities
03:10 Exploring PAM Libraries and Arguments
05:02 System Authentication Flow
05:55 Practical Example: Configuring PAM for Login
07:57 Advanced PAM Configuration: LDAP and Two-Factor Authentication
10:24 Troubleshooting and Best Practices

show more

Share/Embed