Pluggable Authentication Modules for Windows NT
نویسندگان
چکیده
To meet the challenge of integrating new methods and technologies into the Internet security framework, it is useful to hide low-level authentication mechanisms from application programmers, system administrators, and users, replacing them with abstractions at a higher level. The Pluggable Authentication Method approach popular in Linux, Solaris, and CDE offers one such abstraction. To implement PAM in NT, we replaced the standard Graphical Identification and Authentication module with one that processes PAM tables. This provides security administrators with a flexible tool to plan and implement authentication policy across a wide range of computing platforms. GINA is woven into the NT logon procedure, making it a difficult module to test and debug. Our PAMbased GINA eases this problem by allowing new authentication mechanisms to be replaced and tested without forcing a reboot.
منابع مشابه
Unified Logons between Windows NT and UNIX using Winbind
Integration of UNIX and Microsoft Windows NT through a unified logon has been considered a “holy grail” in heterogeneous computing environments for a long time. We present winbind, a component of the Samba suite of programs as a solution to the unified logon problem. Winbind uses a UNIX implementation of Microsoft RPC calls, Pluggable Authentication Modules, and the Name Service Switch to allow...
متن کاملPluggable Authentication Module for Windows NT
To meet the challenge of integrating new methods and technologies into the Internet security framework, it is useful to hide low-level authentication mechanisms from application programmers, system administrators, and users, replacing them with abstractions at a higher level. The Pluggable Authentication Method approach popular in Linux, Solaris, and CDE offers one such abstraction. To implemen...
متن کاملPAM.NET: A .NET Framework For Pluggable Authentication Modules
Authentication is one of the core security services of a distributed application platform. A variety of mechanisms to perform authentication have been developed, and it is beneficial if the choice for a specific mechanism is not hardcoded in an application. Pluggable Authentication Modules (PAM) is the name of a technology to support flexible changes with respect to the authentication mechanism...
متن کاملWygodny I Bezpieczny Dostęp Do Klastrów Obliczeniowych
The investigation presented in this paper was prompted by the need to provide a manageable solution for secure access to computing clusters with a federated authentication framework. This requirement is especially important for scientists who need direct access to computing nodes in order to run their applications (e.g. chemical or medical simulations) with proprietary, open-source or custom-de...
متن کاملHeimdal and Windows 2000 Kerberos - How to Get Them to Play Together
As a practical means of achieving better security and single sign-on, the Kerberos network authentication system has been in wide use in the Unix world for many years. Microsoft has included its own implementation in Windows 2000, replacing the NTLM authentication system from older Windows NT versions. This facilitates sharing account information between Unix and Windows machines, as there is n...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 1997