Este contenido no está disponible en el idioma seleccionado.
Part III. Secure Applications
This part provides details on how to use
Pluggable Authentication Modules
(PAM
), how to use the Kerberos
authentication protocol and the certmonger
daemon, and, finally, how to configure applications for Single sign-on
(SSO
).