PAM Tutorial © 2005–2010 by Wayne Pollock, Tampa Florida USA. All Rights Reserved. Many interactive commands are security sensitive. An obvious example is passwd used to change a user's password. Such commands require users to authenticate themselves even though they have successfully logged in to the system. Also many server daemons carry out tasks on behalf of remote users, and most of the