mattdm at mattdm.org
Wed May 12 02:44:03 UTC 2004
On Tue, May 11, 2004 at 08:10:30AM -0600, Stephen Smoogen wrote:
> The standard way I have seen it implemented on other versions of Linux
> (here and other large organizations) is that the central authentication
> is used first in the pam stack and if it fails/isnt available you get
> authorized against the local password db which if it works lets you in.
"Other versions" including Red Hat Linux up until it suddenly stopped
working circa version 7.3.
Matthew Miller mattdm at mattdm.org <http://www.mattdm.org/>
Boston University Linux ------> <http://linux.bu.edu/>
More information about the devel