Red Hat Training

A Red Hat training course is available for Red Hat Enterprise Linux

Part III. Secure Applications

This part provides details on how to use Pluggable Authentication Modules (PAM), how to use the Kerberos authentication protocol and the certmonger daemon, and, finally, how to configure applications for Single sign-on (SSO).