Welcome to Linux Knowledge Base and Tutorial
"The place where you learn linux"
GetNetWise: You
e One Click Away

 Create an AccountHome | Submit News | Your Account  

Tutorial Menu
Linux Tutorial Home
Table of Contents

· Introduction to Operating Systems
· Linux Basics
· Working with the System
· Shells and Utilities
· Editing Files
· Basic Administration
· The Operating System
· The X Windowing System
· The Computer Itself
· Networking
· System Monitoring
· Solving Problems
· Security
· Installing and Upgrading
· Linux and Windows

Glossary
MoreInfo
Man Pages
Linux Topics
Test Your Knowledge

Site Menu
Site Map
FAQ
Copyright Info
Terms of Use
Privacy Info
Disclaimer
WorkBoard
Thanks
Donations
Advertising
Masthead / Impressum
Your Account

Communication
Feedback
Forums
Private Messages
Surveys

Features
HOWTOs
News Archive
Submit News
Topics
User Articles
Web Links

Google
Google


The Web
linux-tutorial.info

Who's Online
There are currently, 169 guest(s) and 0 member(s) that are online.

You are an Anonymous user. You can register for free by clicking here

  

pam




SYNOPSIS

       /etc/pam.conf


DESCRIPTION

       This  manual  is intended to offer a quick introduction to
       Linux-PAM.  For more information the reader is directed to
       the Linux-PAM system administrators' guide.

       Linux-PAM Is a system of libraries that handle the authen­
       tication tasks of applications (services) on  the  system.
       The  library provides a stable general interface (Applica­
       tion Programming Interface - API) that privilege  granting
       programs  (such as login(1) and su(1)) defer to to perform
       standard authentication tasks.

       The principal feature of the  PAM  approach  is  that  the
       nature  of the authentication is dynamically configurable.
       In other words, the system administrator is free to choose
       how individual service-providing applications will authen­
       ticate users. This dynamic configuration  is  set  by  the
       contents   of  the  single  Linux-PAM  configuration  file
       /etc/pam.conf.  Alternatively, the  configuration  can  be
       set  by  individual  configuration  files  located  in the
       /etc/pam.d/ directory.  The  presence  of  this  directory
       will cause Linux-PAM to ignore /etc/pam.conf.

       From  the  point  of view of the system administrator, for
       whom this manual is provided, it is not of primary  impor­
       tance to understand the internal behavior of the Linux-PAM
       library.  The important point to  recognize  is  that  the
       configuration file(s) define the connection between appli­
       cations (services) and the pluggable  authentication  mod­
       ules  (PAMs) that perform the actual authentication tasks.

       Linux-PAM separates the tasks of authentication into  four
       independent management groups: account management; authen­
       tication management; password management; and session man­
       agement.   (We  highlight the abbreviations used for these
       groups in the configuration file.)

       Simply put, these groups take care of different aspects of
       a typical user's request for a restricted service:

       password  -  this  group's  responsibility  is the task of
       updating authentication mechanisms. Typically,  such  ser­
       vices  are  strongly  coupled  to those of the auth group.
       Some authentication mechanisms  lend  themselves  well  to
       being  updated  with  such a function. Standard UN*X pass­
       word-based access is the obvious example: please  enter  a
       replacement password.

       session  - this group of tasks cover things that should be
       done prior to a service being given and after it is  with­
       drawn.  Such tasks include the maintenance of audit trails
       and the mounting of the user's home directory. The session
       management group is important as it provides both an open­
       ing and closing hook for modules to  affect  the  services
       available to a user.


The configuration file(s)

       When  a  Linux-PAM aware privilege granting application is
       started, it activates its attachment to the PAM-API.  This
       activation  performs a number of tasks, the most important
       being  the   reading   of   the   configuration   file(s):
       /etc/pam.conf.  Alternatively, this may be the contents of
       the /etc/pam.d/ directory.

       These files list the PAMs that will do the  authentication
       tasks required by this service, and the appropriate behav­
       ior of the PAM-API in the event that individual PAMs fail.

       The  syntax  of the /etc/pam.conf configuration file is as
       follows. The file is made up of a list of rules, each rule
       is  typically placed on a single line, but may be extended
       with an escaped end of line: `\<LF>'.  Comments  are  pre­
       ceded with `#' marks and extend to the next end of line.

       The format of each rule is a space separated collection of
       tokens, the first three being case-insensitive:

          service  type  control  module-path  module-arguments

       The syntax of files contained in  the  /etc/pam.d/  direc­
       tory,  are identical except for the absence of any service
       field. In this case, the service is the name of  the  file
       in  the  /etc/pam.d/  directory.  This filename must be in
       lower case.

       An important feature of Linux-PAM, is  that  a  number  of
       the  subsequent  module  is  to  be associated with. Valid
       entries are: account; auth; password;  and  session.   The
       meaning of each of these tokens was explained above.

       The  third  field,  control, indicates the behavior of the
       PAM-API should the module fail to succeed in its authenti­
       cation  task.  There are two types of syntax for this con­
       trol field: the simple one has a  single  simple  keyword;
       the  more  complicated  one  involves  a  square-bracketed
       selection of value=action pairs.

       For the simple (historical) syntax  valid  control  values
       are:  requisite  -  failure  of  such a PAM results in the
       immediate  termination  of  the  authentication   process;
       required  -  failure of such a PAM will ultimately lead to
       the PAM-API returning failure but only after the remaining
       stacked  modules  (for  this  service  and type) have been
       invoked; sufficient - success of such a module  is  enough
       to satisfy the authentication requirements of the stack of
       modules (if a prior required module has failed the success
       of this one is ignored); optional - the success or failure
       of this module is only important if it is the only  module
       in the stack associated with this service+type.

       For  the more complicated syntax valid control values have
       the following form:

       [value1=action1value2=action2...]

       Where valueN corresponds to the return code from the func­
       tion  invoked in the module for which the line is defined.
       It is selected from one of these: success; open_err;  sym­
       bol_err;  service_err;  system_err;  buf_err; perm_denied;
       auth_err;       cred_insufficient;       authinfo_unavail;
       user_unknown;  maxtries;  new_authtok_reqd;  acct_expired;
       session_err; cred_unavail; cred_expired; cred_err; no_mod­
       ule_data;   conv_err;   authtok_err;  authtok_recover_err;
       authtok_lock_busy;    authtok_disable_aging;    try_again;
       ignore;  abort; authtok_expired; module_unknown; bad_item;
       and default.  The last of  these,  default,  implies  'all
       valueN's  not mentioned explicitly. Note, the full list of
       PAM   errors   is    available    in    /usr/include/secu­
       rity/_pam_types.h  . The actionN can be: an unsigned inte­
       ger, J, signifying an action of 'jump over the next J mod­
       ules in the stack'; or take one of the following forms:
       ignore  -  when used with a stack of modules, the module's
       return status will not contribute to the return  code  the
       application obtains;
       bad - this action indicates that the return code should be
       done  - equivalent to ok with the side effect of terminat­
       ing the module stack and PAM immediately returning to  the
       application.
       reset  - clear all memory of the state of the module stack
       and start again with the next stacked module.

       module-path - this is either the full filename of the  PAM
       to be used by the application (it begins with a '/'), or a
       relative  pathname  from  the  default  module   location:
       /lib/security/.

       module-arguments  -  these  are  a space separated list of
       tokens that can be used to modify the specific behavior of
       the  given PAM. Such arguments will be documented for each
       individual module.


FILES

       /etc/pam.conf - the configuration file
       /etc/pam.d/ - the Linux-PAM configuration directory.  Gen­
       erally,  if  this  directory is present, the /etc/pam.conf
       file is ignored.
       /lib/libpam.so.X - the dynamic library
       /lib/security/*.so - the PAMs


ERRORS

       Typically errors generated  by  the  Linux-PAM  system  of
       libraries, will be written to syslog(3).


CONFORMING TO

       DCE-RFC 86.0, October 1995.
       Contains  additional features, but remains backwardly com­
       patible with this RFC.


BUGS

       None known.


SEE ALSO

       The three Linux-PAM  Guides,  for  system  administrators,
       module developers, and application developers.

Linux-PAM 0.74             2001 Jan 20                     PAM(8)
  
Help us cut cost by not downloading the whole site!
Use of automated download sofware ("harvesters") such as wget, httrack, etc. causes the site to quickly exceed its bandwidth limitation and therefore is expressedly prohibited. For more details on this, take a look here

Login
Nickname

Password

Security Code
Security Code
Type Security Code


Don't have an account yet? You can create one. As a registered user you have some advantages like theme manager, comments configuration and post comments with your name.

Help if you can!


Amazon Wish List

Did You Know?
You can help in many different ways.


Friends



Tell a Friend About Us

Bookmark and Share



Web site powered by PHP-Nuke

Is this information useful? At the very least you can help by spreading the word to your favorite newsgroups, mailing lists and forums.
All logos and trademarks in this site are property of their respective owner. The comments are property of their posters. Articles are the property of their respective owners. Unless otherwise stated in the body of the article, article content (C) 1994-2013 by James Mohr. All rights reserved. The stylized page/paper, as well as the terms "The Linux Tutorial", "The Linux Server Tutorial", "The Linux Knowledge Base and Tutorial" and "The place where you learn Linux" are service marks of James Mohr. All rights reserved.
The Linux Knowledge Base and Tutorial may contain links to sites on the Internet, which are owned and operated by third parties. The Linux Tutorial is not responsible for the content of any such third-party site. By viewing/utilizing this web site, you have agreed to our disclaimer, terms of use and privacy policy. Use of automated download software ("harvesters") such as wget, httrack, etc. causes the site to quickly exceed its bandwidth limitation and are therefore expressly prohibited. For more details on this, take a look here

PHP-Nuke Copyright © 2004 by Francisco Burzi. This is free software, and you may redistribute it under the GPL. PHP-Nuke comes with absolutely no warranty, for details, see the license.
Page Generation: 0.09 Seconds