Pluggable Authentication Modules (Pam)
Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
computer science crazy
Super Moderator

Posts: 3,048
Joined: Dec 2008
22-09-2008, 09:18 AM

As current authentication mechanisms evolve and as new authentication mechanisms are introduced, system entry services such as login, rlogin, and telnet must continually be customized to incorporate these changes.

With the Pluggable Authentication Module (PAM) framework, multiple authentication technologies can be added without changing any of the login services, thereby preserving existing system environments. PAM can be used to integrate login services with different authentication technologies, such as RSA, DCE, Kerberos, S/Key, and smart card based authentication systems.

Thus, PAM enables networked machines to exist peacefully in a heterogeneous environment, where multiple security mechanisms are in place. The PAM framework and the module interfaces provide pluggability for user authentication, as well as for account, session, and password management. login and other system-entry services can use the PAM architecture, and thus ensure that
Use Search at wisely To Get Information About Project Topic and Seminar ideas with report/source code along pdf and ppt presenaion
Active In SP

Posts: 4
Joined: Mar 2011
06-03-2011, 10:54 PM


Can I pls get more info about the project and implimentation? I need to give a technical seminar and presentation at college.


seminar project explorer
Active In SP

Posts: 231
Joined: Feb 2011
07-03-2011, 12:15 AM

PAM, is a mechanism to integrate multiple low-level authentication schemes into a high-level application programming interface (API). PAM can do many things for you but the primary focus is to authenticate your users. It also allows to set up the environment the users will work in. a user name and a password has to be provided by the user to authenticate himself and gain access to the system.

Need for PAM
PAM and PAM-aware applications reduce the complexity of authentication. With the use of PAM, the system administrator can choose to use the same user database for every login process of your system. PAM has a well defined API so that the PAM dependent appliations will not crash even when the system administrator changes the underlying settings for the PAM. PAM can be taken advantage of by the application programmers if their application requires some kind of authentication. In this case, much less programming is involved and you don't have to write a complete set of authentication functions. appropriate back end to store user names and passwords can be chosen by the system administrator.

Get the details here:
Active In SP

Posts: 4
Joined: Mar 2011
03-04-2011, 06:08 PM

I finished preparing the report. I have uploaded the file so that someone else can use it for a technical seminar and presentation.

thank you.

Important Note..!

If you are not satisfied with above reply ,..Please


So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Tagged Pages: pluggable authentication modules pam ppt seminar, pluggable authentication seminar report, pam2 pluggable authentication, pluggable authentication module full seminar pdf, pam authentication ppt, ppt on pluggable authentication modules, pluggable authentication modules pam pdf,
Popular Searches: authentication service**ntages of pendulum pump, pccp authentication, integrated power electronic modules ppt, authentication encryp, semin rn pr ce o polymeryech s tvarovou pam t, erp modules, shibboleth authentication,

Quick Reply
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  3D PASSWORD FOR MORE SECURE AUTHENTICATION full report computer science topics 144 92,195 13-05-2014, 10:16 AM
Last Post: seminar project topic
  Controlled Data Hiding Technique for Color Image Authentication in Frequency pdf seminar projects maker 0 469 26-09-2013, 03:02 PM
Last Post: seminar projects maker
  Biometrics Based Authentication Systems (Download Full Abstract And Report) computer science crazy 13 8,285 24-08-2013, 04:38 PM
Last Post: Guest
  Capturing Hand or Wrist Vein Images for Biometric Authentication Using Low-Cost study tips 0 321 20-08-2013, 04:30 PM
Last Post: study tips
  Improved Feature Processing for Iris Biometric Authentication System pdf study tips 0 330 03-08-2013, 02:21 PM
Last Post: study tips
  Design and Implementation of Improved Authentication System for Android pdf study tips 0 401 12-07-2013, 03:14 PM
Last Post: study tips
  ppt on Biometric Authentication study tips 0 246 17-06-2013, 02:59 PM
Last Post: study tips
  REPORT ON AUTHENTICATION study tips 0 264 12-06-2013, 04:51 PM
Last Post: study tips
  SIGNATURE AUTHENTICATION pdf study tips 0 285 11-06-2013, 03:35 PM
Last Post: study tips
  REPORT ON 3D PASSWORD AUTHENTICATION study tips 0 316 13-05-2013, 04:16 PM
Last Post: study tips