This section will discuss good practices for constructing a secure pam.conf file.
Perhaps it needs a list of the currently available Linux-PAM modules and a brief description of what they do?