Managing Systems and Workgroups: A Guide for HP-UX System Administrators

Administering a System: Managing System Security
Pluggable Authentication Modules (PAM)
Chapter 8 851
2 and 3 of /etc/pam.conf with “debug” and “try_first_pass”,
respectively. Then the modules specified by lines 2 and 3 are executed
with the revised options.
When isabel logs in, line 1 in /etc/pam.conf causes PAM to read
/etc/pam_user.conf and temporarily replace the
options
field of line 2
of /etc/pam.conf with “debug use_psd”. Line 3 is unchanged. Then the
modules specified by lines 2 and 3 are executed with the revised options.
When george logs in, line 1 in /etc/pam.conf causes PAM to read
/etc/pam_user.conf. Since there are no entries for george, lines 2 and
3 of /etc/pam_user.conf are not changed. Then the modules specified
by lines 2 and 3 are executed with no changes.