Chapter 7. Security Subsystem

Table of Contents

7.1. Authentication
7.1.1. Linux PAM Example
7.2. Authorization
7.2.1. Example: Security Enhanced Linux