HP-UX System Administrator's Guide: Security Management HP-UX 11i v3 (B3921-90020, September 2010)

Table Of Contents
Programs requiring user authentication pass their requests to PAM, which determines
the correct verification method and returns the appropriate response. The programs
do not need to know what authentication method is being used. See Figure 2-1 for an
overview.
Figure 2-1 HP-UX Authentication Modules Under PAM
libpam_ntlm.1
PAM Library
libpam_krb5.1
libpam_unix.1
libpam_ldap.1libpam_dce.1
login
su
passwd telnet
UNIX DCE Kerberos
LDAP NTLM
libpam_radius.1
RADIUS
Use the PAM configuration
file, /etc/pam.conf, to indicate
which authentication module
to use.
Request for
Validation
Authentication Services
The authentication methods are specified on both a systemwide and individual user
basis using the following PAM system files:
/etc/pam.conf
Systemwide control file. Defines which service modules
are to be paired with services. These are regarded as
system defaults.
/etc/pam_user.conf
Individual user control file. Defines which options are
to be used by service modules on specific users. This is
an optional file.
See pam(3), pam.conf(4), pam_updbe(5), pam_user.conf(4) for more information.
2.3 Authenticating Users with PAM 35