Pluggable Authentication Module for Windows NT
dc.contributor.author | Itoi, Naomaru | en_US |
dc.contributor.author | Honeyman, Peter | en_US |
dc.date.accessioned | 2014-07-18T18:11:56Z | |
dc.date.available | 2014-07-18T18:11:56Z | |
dc.date.issued | 1998-04-10 | en_US |
dc.identifier.citation | N. Itoi and P. Honeyman, "Pluggable Authentication Module for Windows NT," April 1998. [USENIX Windows NT Symposium, Seattle (August 1998).] <http://hdl.handle.net/2027.42/107916> | en_US |
dc.identifier.uri | https://hdl.handle.net/2027.42/107916 | |
dc.description.abstract | To meet the challenge of integrating new methods and technologies into the Internet security framework, it is useful to hide low-level authentication mechanisms from application n programmers, system administrators, and users, replacing them with abstractions at a higher level. The Pluggable Authentication Method approach popular in Linux, Solaris, and CDE offers one such abstraction. To implement PAM in NT, we replaced the standard Graphical Identification and Authentication module with one that processes PAM tables. This provides security administrators with a flexible tool to plan and implement authentication policy across a wide range of computing platforms. GINA is woven into the NT logon procedure, making it a difficult module to test and debug. Our PAM-based GINA solves this problem by allowing authentication mechanisms to be replaced and tested without forcing a reboot. | en_US |
dc.publisher | Center for Information Technology Integration | en_US |
dc.title | Pluggable Authentication Module for Windows NT | en_US |
dc.type | Technical Report | en_US |
dc.subject.hlbsecondlevel | Computer Science | en_US |
dc.subject.hlbtoplevel | Engineering | en_US |
dc.contributor.affiliationum | Center for Information Technology Integration | en_US |
dc.description.bitstreamurl | http://deepblue.lib.umich.edu/bitstream/2027.42/107916/1/citi-tr-98-1.pdf | |
dc.owningcollname | Electrical Engineering and Computer Science, Department of (EECS) |
Files in this item
Remediation of Harmful Language
The University of Michigan Library aims to describe its collections in a way that respects the people and communities who create, use, and are represented in them. We encourage you to Contact Us anonymously if you encounter harmful or problematic language in catalog records or finding aids. More information about our policies and practices is available at Remediation of Harmful Language.
Accessibility
If you are unable to use this file in its current format, please select the Contact Us link and we can modify it to make it more accessible to you.