Red Hat Training
A Red Hat training course is available for Red Hat Enterprise Linux
Part III. Secure Applications
This part provides details on how to use
Pluggable Authentication Modules
(PAM
), how to use the Kerberos
authentication protocol and the certmonger
daemon, and, finally, how to configure applications for Single sign-on
(SSO
).