Red Hat Linux 7.2: The Official Red Hat Linux Reference Guide | ||
---|---|---|
Prev | Chapter 7. Pluggable Authentication Modules (PAM) | Next |
If you are using shadow passwords, pam_unix.so will automatically detect that they are in use and will use them to authenticate users.
Please refer to Official Red Hat Linux Customization Guide for more information on shadow passwords.