Authenticator Management The SSH daemon disallows the use of empty passwords. Additionally, the SSH daemon uses PAM to support authenticator security. References: IA-5c.