The Appx Login Manager can now use PAM to validate user ids/passwords.
To configure the Appx Login Manager to use PAM, you must set the following parameters in the service .ini file:
AuthenticationMethod = PAM
PAMService = appxpam # name of service in /etc/pam.d
PAMService points to a PAM Policy file (in the /etc/pam.d directory on Linux systems). This can be an existing policy file, or you can create a new one for Appx logins. This is case sensitive if the O/S file names are case sensitive. See the attached AppxPam.ini and appxpam for examples.
You should be able to use most authentication plugins supported by PAM.
Consult your O/S documentation on configuring PAM for your O/S.
Read what other users have said about this page or add your own comments.
-- JeanNeron - 2013-10-10
I | Attachment | History | Action | Size | Date | Who | Comment |
---|---|---|---|---|---|---|---|
![]() |
AppxPam.ini | r1 | manage | 4.1 K | 2013-10-10 - 20:28 | UnknownUser | Example AppxPam.ini |
![]() |
appxpam | r1 | manage | 0.2 K | 2013-10-10 - 20:29 | UnknownUser | Example PAM Policy File for AppxPAM |