How to Install and Uninstall pam_mount.x86_64 Package on Red Hat Enterprise Linux 8 (RHEL 8)

Last updated: October 06,2024

1. Install "pam_mount.x86_64" package

This guide let you learn how to install pam_mount.x86_64 on Red Hat Enterprise Linux 8 (RHEL 8)

$ sudo dnf update $ sudo dnf install pam_mount.x86_64

2. Uninstall "pam_mount.x86_64" package

Please follow the guidelines below to uninstall pam_mount.x86_64 on Red Hat Enterprise Linux 8 (RHEL 8):

$ sudo dnf remove pam_mount.x86_64 $ sudo dnf autoremove

3. Information about the pam_mount.x86_64 package on Red Hat Enterprise Linux 8 (RHEL 8)

Last metadata expiration check: 0:48:02 ago on Mon Feb 26 15:59:38 2024.
Available Packages
Name : pam_mount
Version : 2.16
Release : 10.el8
Architecture : x86_64
Size : 136 k
Source : pam_mount-2.16-10.el8.src.rpm
Repository : epel
Summary : A PAM module that can mount volumes for a user session
URL : http://pam-mount.sourceforge.net/
License : LGPLv2+ and (LGPLv2 or LGPLv3) and Public Domain
Description : This module is aimed at environments with central file servers that a user
: wishes to mount on login and unmount on logout, such as (semi-)diskless
: stations where many users can logon and where statically mounting the entire
: /home from a server is a security risk, or listing all possible volumes in
: /etc/fstab is not feasible.
:
: * Users can define their own list of volumes without having to change
: (possibly non-writable) global config files.
: * Single sign-on feature - the user needs to type the password just once (at login)
: * Transparent mount process
: * No stored passwords
: * Volumes are unmounted on logout, freeing system resources and not leaving
: data exposed.
:
: The module also supports mounting local filesystems of any kind the normal
: mount utility supports, with extra code to make sure certain volumes are set up
: properly because often they need more than just a mount call, such as
: encrypted volumes. This includes SMB/CIFS, FUSE, dm-crypt and LUKS.
:
: If you intend to use pam_mount to protect volumes on your computer using an
: encrypted filesystem system, please know that there are many other issues you
: need to consider in order to protect your data. For example, you probably want
: to disable or encrypt your swap partition (the cryptoswap can help you do
: this). Do not assume a system is secure without carefully considering
: potential threats.