Alternative Authentication Methods

Authentication represents the most glaring security hole in most organizations. Many sites simply require a username and password for user authentication, and that method is sufficient for most sites. However, when you think about how easy it is for someone to guess a password, sniff a network connection, or even just look over your shoulder while you are typing a password, you quickly understand that usernames and passwords are not the most secure authentication mechanism by any means.

Unix, like most other operating systems, is capable of supporting alternative authentication methods. This section documents some of the more common methods seen in practice.

Pluggable Authentication Modules

Red Hat Linux, HP-UX, ...

Get Unix® System Management Primer Plus now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.