BookmarkSubscribeRSS Feed
woo
Barite | Level 11 woo
Barite | Level 11

Hi guys ---

can i have some documents on UNIX PAM security? I want to know how it works...?

Thanks a lot!

4 REPLIES 4
Patrick
Opal | Level 21

What holds you back to just Google for such information?

woo
Barite | Level 11 woo
Barite | Level 11

I thought i can find precise documents from all Genius we have here ...

Thanks!

jakarman
Barite | Level 11

The only place SAS is having documents with PAM is: http://support.sas.com/documentation/installcenter/en/ikfdtnunxcg/66380/PDF/default/config.pdf

see page 16. Pam is in the heart of in OS and getting aligned wiht those people is often very difficult.

What is happening is that all kind of processes are forked and switched in user-context (sasauth) by SAS.

This is normally the SSH (and sudo) reserved area and you are getting in troubles waters with security and OS people. SAS is bypassing SSH and Sudo.

   

If you are lucky to use AIX you see that IBM is not using PAM on that but instead it is using LAM.

---->-- ja karman --<-----
woo
Barite | Level 11 woo
Barite | Level 11

Thanks Jaap - that will help!

hackathon24-white-horiz.png

The 2025 SAS Hackathon has begun!

It's finally time to hack! Remember to visit the SAS Hacker's Hub regularly for news and updates.

Latest Updates

Creating Custom Steps in SAS Studio

Check out this tutorial series to learn how to build your own steps in SAS Studio.

Find more tutorials on the SAS Users YouTube channel.

SAS Training: Just a Click Away

 Ready to level-up your skills? Choose your own adventure.

Browse our catalog!

Discussion stats
  • 4 replies
  • 1943 views
  • 3 likes
  • 3 in conversation