PAM Kerberos v 1.26 Release Notes
Table 1-1 PAM Kerberos v 1.26 File sets on HP-UX 11i v1 (continued)
Library NameDescriptionFile Set Name
/usr/sbin/pamkrbval
PAM-Kerberos
Runtime Validation
Tool
PAM-KRB-RUN
/usr/lib/security/libpam_krb5.1
PAM-Kerberos 32-bit
Shared Library
PAM-KRB-SHLIB
Table 1-2 lists the file sets in PAM Kerberos v 1.26 on HP-UX 11i v2 and HP-UX 11i v3.
Table 1-2 PAM Kerberos v 1.26 File sets on HP-UX 11i v2 and HP-UX 11i v3.
Library NameDescriptionFileset Name
/usr/lib/security/pa20_64/
libpam_krb5.so.1–>/usr/lib/security/
pa20_64/libpam_krb5.1
PAM-Kerberos
64-bit Shared
Library
PAM-KRB-64SLIB
/etc/pam.krb5
PAM-Kerberos
Demonstration
PAM-KRB-DEMO
/usr/lib/security/hpux64/libpam_krb5.so.1
PAM-Kerberos
64-bit IA Shared
Library
PAM-KRB-I64LIB
/usr/lib/security/hpux32/libpam_krb5.so.1
PAM-Kerberos
32-bit IA Shared
Library
PAM-KRB-IASLIB
/usr/share/man/man5.Z/pam_krb5.5
/usr/share/man/man1m.z/pamkrbval.1m
PAM-Kerberos
Manpages
PAM-KRB-MAN
/usr/sbin/pamkrbval
PAM-Kerberos
Runtime
Validation Tool
PAM-KRB-RUN
/usr/lib/security/
libpam_krb5.so.1–>/usr/lib/security/
libpam_krb5.1
PAM-Kerberos
32-bit Shared
Library
PAM-KRB-SHLIB
Modules Supported by PAM Kerberos v 1.26
The PAM Kerberos v1.26 library supports the following modules:
• Authentication module
• Account management module
• Session management module
• Password management module
To configure these modules for PAM Kerberos v 1.26, the system administrator must point the
required PAM module to the corresponding applications.
Authentication Module
The Authentication Module verifies the identity of a user and sets the user-specific credentials.
It authenticates the user to KDC with a password. If the password matches, the user is
authenticated and a Ticket Granting Ticket (TGT) is granted.
The credential management function sets user-specific credentials. It stores the credentials in a
cache file and exports KRB5CCNAME, an environment variable, to identify the credential cache
file. This unique credential file is created in the /tmp directory when a user logs in to the system
using system entry services such as login, ftp, rlogin, or telnet.
Overview 7