... computer into the picture, the situation changes dramatically. Computers (atleast today's computers) don't have eyes, ears, or noses. Even if they did, the current state-of -the- art inpattern ... andauthorization, and how they relate to each other. 2.1.1 Authentication Simply put, authentication is the process of verifying the identity of a particular user. To authenticate auser, the user is asked ... using the credentials that the user provided. If the user is granted access to the directory, the authentication issuccessful. The pam_ldap PAM module uses this latter method to authenticate against...