How does PAM Authentication Work?
How does PAM Authentication Work? I want to setup an SSH login and I was reading about PAM authentication as being a stronger form of password authentication. From a high level perspective, how does this work?
Thanks, Eric
|