Table of Contents
29 relations: API, Authentication, Common Desktop Environment, DragonFly BSD, FreeBSD, HP-UX, IBM AIX, Identity management, Java Authentication and Authorization Service, Kerberos (protocol), Linux, Linux PAM, MacOS, Name Service Switch, NetBSD, Open Software Foundation, Open source, OpenPAM, Oracle Solaris, Red Hat Linux, Request for Comments, Secure Shell, Simple Authentication and Security Layer, Single sign-on, SPNEGO, Sun Microsystems, System Security Services Daemon, Ticket Granting Ticket, X/Open.
- Computer security standards
- Open Group standards
- Unix authentication-related software
API
An is a way for two or more computer programs or components to communicate with each other. Pluggable authentication module and API are Application programming interfaces.
See Pluggable authentication module and API
Authentication
Authentication (from authentikos, "real, genuine", from αὐθέντης authentes, "author") is the act of proving an assertion, such as the identity of a computer system user.
See Pluggable authentication module and Authentication
Common Desktop Environment
The Common Desktop Environment (CDE) is a desktop environment for Unix and OpenVMS, based on the Motif widget toolkit. Pluggable authentication module and Common Desktop Environment are open Group standards.
See Pluggable authentication module and Common Desktop Environment
DragonFly BSD
DragonFly BSD is a free and open-source Unix-like operating system forked from FreeBSD 4.8.
See Pluggable authentication module and DragonFly BSD
FreeBSD
FreeBSD is a free and open-source Unix-like operating system descended from the Berkeley Software Distribution (BSD).
See Pluggable authentication module and FreeBSD
HP-UX
HP-UX (from "Hewlett Packard Unix") is Hewlett Packard Enterprise's proprietary implementation of the Unix operating system, based on Unix System V (initially System III) and first released in 1984.
See Pluggable authentication module and HP-UX
IBM AIX
AIX (Advanced Interactive eXecutive, pronounced) is a series of proprietary Unix operating systems developed and sold by IBM for several of its computer platforms.
See Pluggable authentication module and IBM AIX
Identity management
Identity management (IdM), also known as identity and access management (IAM or IdAM), is a framework of policies and technologies to ensure that the right users (that are part of the ecosystem connected to or within an enterprise) have the appropriate access to technology resources.
See Pluggable authentication module and Identity management
Java Authentication and Authorization Service
Java Authentication and Authorization Service, or JAAS, pronounced "Jazz", is the Java implementation of the standard Pluggable Authentication Module (PAM) information security framework.
See Pluggable authentication module and Java Authentication and Authorization Service
Kerberos (protocol)
Kerberos is a computer-network authentication protocol that works on the basis of tickets to allow nodes communicating over a non-secure network to prove their identity to one another in a secure manner.
See Pluggable authentication module and Kerberos (protocol)
Linux
Linux is both an open-source Unix-like kernel and a generic name for a family of open-source Unix-like operating systems based on the Linux kernel, an operating system kernel first released on September 17, 1991, by Linus Torvalds.
See Pluggable authentication module and Linux
Linux PAM
Linux Pluggable Authentication Modules (PAM) is a suite of libraries that allow a Linux system administrator to configure methods to authenticate users. Pluggable authentication module and Linux PAM are computer security software stubs.
See Pluggable authentication module and Linux PAM
MacOS
macOS, originally Mac OS X, previously shortened as OS X, is an operating system developed and marketed by Apple since 2001.
See Pluggable authentication module and MacOS
Name Service Switch
The Name Service Switch (NSS) is an interface of glibc that connects a computer with a variety of sources of common configuration databases and name resolution mechanisms.
See Pluggable authentication module and Name Service Switch
NetBSD
NetBSD is a free and open-source Unix-like operating system based on the Berkeley Software Distribution (BSD).
See Pluggable authentication module and NetBSD
Open Software Foundation
The Open Software Foundation (OSF) was a not-for-profit industry consortium for creating an open standard for an implementation of the operating system Unix.
See Pluggable authentication module and Open Software Foundation
Open source
Open source is source code that is made freely available for possible modification and redistribution.
See Pluggable authentication module and Open source
OpenPAM
OpenPAM is a BSD-licensed implementation of PAM used by FreeBSD, NetBSD, DragonFly BSD and macOS (starting with Snow Leopard), and offered as an alternative to Linux PAM in certain Linux distributions. Pluggable authentication module and OpenPAM are computer security software stubs.
See Pluggable authentication module and OpenPAM
Oracle Solaris
Solaris is a proprietary Unix operating system originally developed by Sun Microsystems.
See Pluggable authentication module and Oracle Solaris
Red Hat Linux
Red Hat Linux was a widely used commercial open-source Linux distribution created by Red Hat until its discontinuation in 2004.
See Pluggable authentication module and Red Hat Linux
Request for Comments
A Request for Comments (RFC) is a publication in a series from the principal technical development and standards-setting bodies for the Internet, most prominently the Internet Engineering Task Force (IETF).
See Pluggable authentication module and Request for Comments
Secure Shell
The Secure Shell Protocol (SSH) is a cryptographic network protocol for operating network services securely over an unsecured network.
See Pluggable authentication module and Secure Shell
Simple Authentication and Security Layer
Simple Authentication and Security Layer (SASL) is a framework for authentication and data security in Internet protocols.
See Pluggable authentication module and Simple Authentication and Security Layer
Single sign-on
Single sign-on (SSO) is an authentication scheme that allows a user to log in with a single ID to any of several related, yet independent, software systems.
See Pluggable authentication module and Single sign-on
SPNEGO
Simple and Protected GSSAPI Negotiation Mechanism (SPNEGO), often pronounced "spenay-go", is a GSSAPI "pseudo mechanism" used by client-server software to negotiate the choice of security technology.
See Pluggable authentication module and SPNEGO
Sun Microsystems
Sun Microsystems, Inc. (Sun for short) was an American technology company that sold computers, computer components, software, and information technology services and created the Java programming language, the Solaris operating system, ZFS, the Network File System (NFS), and SPARC microprocessors.
See Pluggable authentication module and Sun Microsystems
System Security Services Daemon
The System Security Services Daemon (SSSD) is software originally developed for the Linux operating system (OS) that provides a set of daemons to manage access to remote directory services and authentication mechanisms.
See Pluggable authentication module and System Security Services Daemon
Ticket Granting Ticket
In some computer security systems, a Ticket Granting Ticket or Ticket to Get Tickets (TGT) is a small, encrypted identification file with a limited validity period.
See Pluggable authentication module and Ticket Granting Ticket
X/Open
X/Open group (also known as the Open Group for Unix Systems and incorporated in 1987 as X/Open Company, Ltd.) was a consortium founded by several European UNIX systems manufacturers in 1984 to identify and promote open standards in the field of information technology.
See Pluggable authentication module and X/Open
See also
Computer security standards
- BS 7799
- Blacker (security)
- Canadian Trusted Computer Product Evaluation Criteria
- Common Criteria
- Common Vulnerability Scoring System
- Content Security Policy
- Cyber Resilience Review
- Cybersecurity Maturity Model Certification
- FIPS 140
- FIPS 140-2
- FIPS 140-3
- FIPS 199
- FedRAMP
- HTTP Strict Transport Security
- IASME
- IEC 60870-6
- IEC 62443
- IEEE 802.10
- ISO/IEC 27002
- ISO/IEC 27017
- ISO/IEC 27018
- ISO/IEC 27019
- ITSEC
- Information security standards
- NIST Cybersecurity Framework
- Pluggable authentication module
- Rainbow Series
- S/MIME
- Same-origin policy
- Security Content Automation Protocol
- Standard of Good Practice for Information Security
- TIBER
- Transport Layer Security
- Trusted Computer System Evaluation Criteria
Open Group standards
- Application Response Measurement
- ArchiMate
- Call Level Interface
- Common Desktop Environment
- Common Manageability Programming Interface
- Common Open Software Environment
- DMAPI
- DRDA
- Distributed Computing Environment
- Future Airborne Capability Environment
- Lightweight Directory Access Protocol
- Motif (software)
- Open Information Security Management Maturity Model
- Open Trusted Technology Provider Standard
- POSIX
- Pluggable authentication module
- Single UNIX Specification
- The Open Group
- The Open Group Architecture Framework
- Universal Data Element Framework
- X Window System
- X/Open XA
Unix authentication-related software
- BSD Authentication
- Group (database)
- Passwd
- Pluggable authentication module
References
Also known as Libpam, Pluggable Authentication Modules, Pluggable authentication, X/Open Single Sign-On, XSSO.