Error Opening Pam Libraries Solaris 8
Technology and Trends Enterprise Architecture and EAI ERP Hardware IT Management and Strategy Java Knowledge Management Linux Networking Oracle PeopleSoft Project and Portfolio Management SAP SCM Security Siebel Storage UNIX Visual Basic Web Design and Development Windows < Back CHOOSE A DISCUSSION GROUP Research Directory TOPICS Database Hardware Networking SAP Security Web Design MEMBERS Paul_Pedant DACREE MarkDeVries Inside-ERP MacProTX VoIP_News Inside-CRM I_am_the_dragon maxwellarnold Michael Meyers-Jouan TerryCurran Chris_Day Andrew.S.Baker Ramnath.Awate JoeTorre bracke Locutus PCMag Dennis Stevenson Craig Borysowich DukeGanote Richard mircea_luca iudithm Nikki Klein AbhaiTripathi knowscognosdoi Clinton Jones Iqbalyk bluesguyAZ59 COMPANIES Thawte Oracle CloudLock Epicor Software ... View All Topics View All Members View All Companies Toolbox for IT Topics UNIX Groups Ask a New Question Solaris The Solaris group is a forum where peers share technical expertise, solve problems, and discuss issues related to the Solaris operating system, including OS-related malfunctions, security issues, and network performance. Home | Invite Peers | More UNIX Groups Your account is ready. You're now being signed in. Solve problems - It's Free Create your account in seconds E-mail address is taken If this is your account,sign in here Email address Username Between 5 and 30 characters. No spaces please The Profile Name is already in use Password Notify me of new activity in this group: Real Time Daily Never Keep me informed of the latest: White Papers Newsletter Jobs By clicking "Join Now", you agree to Toolbox for Technology terms of use, and have read and understand our privacy policy. Error opening PAM Libraries User208620 asked Oct 3, 2002 | Replies (5) Dear friends, My friend has changed the owner using chown command for some system file. I exactly don't know which file he has changed. I suppose they have changed some security file. But now when i boot the system, it says that " Error opening PAM libraries. Please Contact your system administrator". It's not allowing me to enter the CDE (Common Desktop Environment). Can anyone help me. What is it actually and how can i overcome it..... Thanks in advance lakshmanan Get Your P
daemons that take advantage of the PAM interfaces are also included. The following figure below illustrates the relationship between the applications, the PAM library, the pam.conf file, and the PAM modules. Figure 3-1 How PAM WorksThe applications (ftp, telnet, and login) use the PAM library to access the appropriate module. The pam.conf file defines which modules to use, and in what order they are to be used with each application. Responses from the modules are passed back through the library to the application. http://unix.ittoolbox.com/groups/technical-functional/solaris-l/error-opening-pam-libraries-149399 The following sections describe the relationship between the PAM components and the applications. PAM Library The PAM library, /usr/lib/libpam, provides the framework to load the appropriate modules and manage the stacking process. The PAM library provides a generic structure to which all of the modules can plug in. Stacking Feature The PAM framework provides a method for authenticating users with http://www.shrubbery.net/solaris9ab/SUNWaadm/SYSADV6/p7.html multiple services by using stacking. Depending on the configuration, the user can be prompted for passwords for each authentication method. The order in which the authentication services are used is determined through the PAM configuration file. Password-Mapping Feature The stacking feature can require that a user remember several passwords. With the password-mapping feature, the primary password is used to decrypt the other passwords so that the user doesn't need to remember or enter multiple passwords. The other option is to synchronize the passwords across each authentication mechanism. Note that this strategy could increase the security risk, because the security of each mechanism is limited by the least secure password method that is used in the stack. Changes to PAM for the Solaris 9 Release The Solaris 9 release includes several enhancements to the PAM service. The following list highlights the most important changes: To accommodate proper stacking, the pam_unix module is broken into single service modules. These modules provide the same capabilities as in the existing module. The capabilities are provided by the following modules: pam_authtok_get, pam_authtok_check,
(Tasks)Next: Chapter 11 Using Solaris Secure Shell (Tasks)Chapter 10 Using PAM This chapter covers the Pluggable Authentication Module (PAM) framework. PAM https://docs.oracle.com/cd/E19683-01/817-0365/pam-1/index.html provides a method to “plug in” authentication services and provides support for multiple authentication services. PAM (Overview) PAM (Tasks) PAM (Reference) PAM (Overview) The Pluggable Authentication Module (PAM) framework lets you “plug in” new authentication technologies without changing system entry services, such as login, ftp, telnet, and so on. You error opening can also use PAM to integrate UNIX login with other security mechanisms like Kerberos. Mechanisms for account, session, and password management can also be “plugged in” by using this framework. Benefits of Using PAM The PAM framework allows you to configure the use of system entry services (ftp, login, telnet, or error opening pam rsh, for example) for user authentication. Some benefits that PAM provides are as follows: Flexible configuration policy Per application authentication policy The ability to choose a default authentication mechanism Multiple passwords on high-security systems Ease of use for the end user No retyping of passwords if the passwords are the same for different mechanisms. The ability to prompt the user for passwords for multiple authentication methods without having the user enter multiple commands. The ability to pass optional parameters to the user authentication services PAM Components The PAM software consists of a library, several modules, and a configuration file. New versions of several commands or daemons that take advantage of the PAM interfaces are also included. The following figure illustrates the relationship between the applications, the PAM library, the pam.conf file, and the PAM modules. Figure 10–1 How PAM WorksThe applications, such as ftp, telnet, and login, use the PAM lib