Pam Face Authentication Configuration Files for Terminal
Purpose: Setting up the necessary configuration files for running the authentication method in terminal.
Outcomes
The authentication program can be called by the command line argument and do the necessary authentication required.
Steps To Complete
- Carry out the necessary changes in PAM configuration files for it to be readable.
- Setup a method to carry out the authentication program using command line arguments in terminal
- Document your process and outcomes.
Acceptance Criteria
It will be considered successful if the command line arguments call the necessary authentication methods and execute them appropriately.