Introduction
Overview of
passwords may not only be stored in any syntax but also means that passwords may remain hidden from view (preventing a decryption attack on the hashed passwords). Because passwords may be stored in any syntax,
With
With
Table | Examples of Commands and Subsystems | ||
| that use PAM and NSS | ||
|
|
| |
Commands that use | Commands that use PAM and |
| |
NSS |
| NSS |
|
|
|
|
|
ls |
| login |
|
|
|
|
|
nsquerya |
| passwd |
|
who |
| ftp |
|
|
|
|
|
whoami |
| su |
|
|
|
|
|
fingerb |
| rlogin |
|
id |
| telnet |
|
|
|
|
|
logname |
| dtlogin |
|
|
|
|
|
groupsb |
| remsh |
|
newgrpb |
|
|
|
pwgetb |
|
|
|
grgetb |
|
|
|
listusersb |
|
|
|
4 | Chapter 1 |