Index of /archives/NetBSD/NetBSD-release-9/src/etc/pam.d
Name Last modified Size Description
Parent Directory -
CVS/ 2024-02-15 03:44 -
system 2023-06-22 06:47 573
su 2023-06-22 06:47 618
sshd 2023-06-22 06:47 828
ftpd 2023-06-22 06:47 667
display_manager 2023-06-22 06:47 806
Makefile 2017-06-19 05:23 292
cron 2017-06-10 02:28 255
racoon 2007-12-08 05:30 232
TODO 2007-02-11 04:40 1.6K
rsh 2005-05-15 00:17 379
telnetd 2005-05-13 11:56 478
xserver 2005-03-19 00:15 260
rexecd 2005-02-28 11:21 431
ppp 2005-02-28 04:29 226
xdm 2005-02-27 12:40 272
pop3 2005-02-27 12:40 173
passwd 2005-02-27 12:40 209
other 2005-02-27 12:40 297
login 2005-02-27 12:40 395
kde 2005-02-27 12:40 230
imap 2005-02-27 12:40 172
gdm 2005-02-27 12:40 230
README 2004-12-12 17:54 2.9K
This directory contains configuration files for the Pluggable
Authentication Modules (PAM) library.
Each file details the module chain for a single service, and must be
named after that service. If no configuration file is found for a
particular service, the /etc/pam.d/other is used instead. If that
file does not exist, /etc/pam.conf is searched for entries matching
the specified service or, failing that, the "other" service.
See the pam(8) manual page for an explanation of the workings of the
PAM library and descriptions of the various files and modules. Below
is a summary of the format for the pam.conf and /etc/pam.d/* files.
Configuration lines take the following form:
module-type control-flag module-path arguments
Comments are introduced with a hash mark ('#'). Blank lines and lines
consisting entirely of comments are ignored.
The meanings of the different fields are as follows:
module-type:
auth: prompt for a password to authenticate that the user is
who they say they are, and set any credentials.
account: non-authentication based authorization, based on time,
resources, etc.
session: housekeeping before and/or after login.
password: update authentication tokens.
control-flag: How libpam handles success or failure of the module.
required: success is required; on failure all remaining
modules are run, but the request will be denied.
requisite: success is required, and on failure no remaining
modules are run.
sufficient: success is sufficient, and if no previous required
module failed, no remaining modules are run.
binding: success is sufficient; on failure all remaining
modules are run, but the request will be denied.
optional: ignored unless the other modules return PAM_IGNORE.
arguments: Module-specific options, plus some generic ones:
debug: syslog debug info.
no_warn: return no warning messages to the application.
Remove this to feed back to the user the
reason(s) they are being rejected.
use_first_pass: try authentication using password from the
preceding auth module.
try_first_pass: first try authentication using password from
the preceding auth module, and if that fails
prompt for a new password.
use_mapped_pass: convert cleartext password to a crypto key.
expose_account: allow printing more info about the user when
prompting.
Note that having a "sufficient" module as the last entry for a
particular service and module type may result in surprising behaviour.
To get the intended semantics, add a "required" entry listing the
pam_deny module at the end of the chain.
$FreeBSD: src/etc/pam.d/README,v 1.5 2004/06/06 11:46:29 schweikh Exp $
$NetBSD: README,v 1.2 2004/12/12 08:54:34 christos Exp $