|Secure Programming for Linux and Unix HOWTO|
|Prev||Chapter 3. Summary of Linux and Unix Security Features||Next|
Sun Solaris and nearly all Linux systems use the Pluggable Authentication Modules (PAM) system for authentication. PAM permits run-time configuration of authentication methods (e.g., use of passwords, smart cards, etc.). See Section 11.6 for more information on using PAM.