![Black Box LS1016A User Manual Download Page 338](http://html.mh-extra.com/html/black-box/ls1016a/ls1016a_user-manual_2763435338.webp)
Appendix D - Linux-PAM
338
BLACK BOX
®
Advanced Console Server
Figure 38: Data flow diagram of Linux-PAM
The left of the figure represents the application: Application X. Such an application interfaces
with the Linux-PAM library and knows none of the specifics of its configured authentication
method. The Linux-PAM library (in the center) consults the contents of the PAM configura-
tion file and loads the modules that are appropriate for Application X. These modules fall into
one of four management groups (lower center) and are stacked in the order they appear in
the configuration file. These modules, when called by Linux-PAM, perform the various
authentication tasks for the application. Textual information, required from or offered to the
user can be exchanged through the use of the application-supplied conversation function.