{"version":"1.0","provider_name":"NetKnights - IT-Sicherheit - Zwei-Faktor-Authentisierung - Verschl\u00fcsselung","provider_url":"https:\/\/netknights.it\/en\/","author_name":"Cornelius K\u00f6lbel","author_url":"https:\/\/netknights.it\/en\/author\/cornelius\/","title":"PAM - Pluggable Authentication Modules","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"32SWM6uLiW\"><a href=\"https:\/\/netknights.it\/en\/glossar\/pam\/\">PAM<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/netknights.it\/en\/glossar\/pam\/embed\/#?secret=32SWM6uLiW\" width=\"600\" height=\"338\" title=\"&#8220;PAM&#8221; &#8212; NetKnights - IT-Sicherheit - Zwei-Faktor-Authentisierung - Verschl\u00fcsselung\" data-secret=\"32SWM6uLiW\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/netknights.it\/wp-includes\/js\/wp-embed.min.js\n<\/script>\n","description":"Pluggable Authentication Module This is the authentication module stack that is mainly used by Linux systems. The modules are stacked and the way through these stacked modules can be defined in a sophisticated way, so that you can setup very flexible authentication scenarios. The open source solution privacyIDEA comes with a special PAM module, to [&hellip;]"}