This section will discuss good practices for constructing a secure
/etc/pam.conf
file. It is currently sadly lacking...
It is not a good thing to have a weak default (OTHER
) entry.
Next Chapter, Previous Chapter
Table of contents of this chapter, General table of contents
Top of the document, Beginning of this Chapter