Red Hat Training
A Red Hat training course is available for Red Hat Enterprise Linux
Part III. Secure Applications
This part provides details on how to use
Pluggable Authentication Modules (PAM), how to use the Kerberos authentication protocol and the certmonger daemon, and, finally, how to configure applications for Single sign-on (SSO).