Shadow Passwords

If you are using shadow passwords, pam_unix.so will automatically detect that they are in use and will use them to authenticate users.

Please refer to Official Red Hat Linux Customization Guide for more information on shadow passwords.