PAM_ACCT_MGMT(3) Linux-PAM Manual PAM_ACCT_MGMT(3)NAME
pam_acct_mgmt - PAM account validation management
SYNOPSIS
#include <security/pam_appl.h>
int pam_acct_mgmt(pam_handle_t *pamh, int flags);
DESCRIPTION
The pam_acct_mgmt function is used to determine if the users account is valid. It checks for authentication token and account expiration
and verifies access restrictions. It is typically called after the user has been authenticated.
The pamh argument is an authentication handle obtained by a prior call to pam_start(). The flags argument is the binary or of zero or more
of the following values:
PAM_SILENT
Do not emit any messages.
PAM_DISALLOW_NULL_AUTHTOK
The PAM module service should return PAM_NEW_AUTHTOK_REQD if the user has a null authentication token.
RETURN VALUES
PAM_ACCT_EXPIRED
User account has expired.
PAM_AUTH_ERR
Authentication failure.
PAM_NEW_AUTHTOK_REQD
The user account is valid but their authentication token is expired. The correct response to this return-value is to require that the
user satisfies the pam_chauthtok() function before obtaining service. It may not be possible for some applications to do this. In such
cases, the user should be denied access until such time as they can update their password.
PAM_PERM_DENIED
Permission denied.
PAM_SUCCESS
The authentication token was successfully updated.
PAM_USER_UNKNOWN
User unknown to password service.
SEE ALSO pam_start(3), pam_authenticate(3), pam_chauthtok(3), pam_strerror(3), pam(8)Linux-PAM Manual 09/19/2013 PAM_ACCT_MGMT(3)
Check Out this Related Man Page
PAM_ACCT_MGMT(3) Linux-PAM Manual PAM_ACCT_MGMT(3)NAME
pam_acct_mgmt - PAM account validation management
SYNOPSIS
#include <security/pam_appl.h>
int pam_acct_mgmt(pam_handle_t *pamh, int flags);
DESCRIPTION
The pam_acct_mgmt function is used to determine if the users account is valid. It checks for authentication token and account expiration
and verifies access restrictions. It is typically called after the user has been authenticated.
The pamh argument is an authentication handle obtained by a prior call to pam_start(). The flags argument is the binary or of zero or more
of the following values:
PAM_SILENT
Do not emit any messages.
PAM_DISALLOW_NULL_AUTHTOK
The PAM module service should return PAM_NEW_AUTHTOK_REQD if the user has a null authentication token.
RETURN VALUES
PAM_ACCT_EXPIRED
User account has expired.
PAM_AUTH_ERR
Authentication failure.
PAM_NEW_AUTHTOK_REQD
The user account is valid but their authentication token is expired. The correct response to this return-value is to require that the
user satisfies the pam_chauthtok() function before obtaining service. It may not be possible for some applications to do this. In such
cases, the user should be denied access until such time as they can update their password.
PAM_PERM_DENIED
Permission denied.
PAM_SUCCESS
The authentication token was successfully updated.
PAM_USER_UNKNOWN
User unknown to password service.
SEE ALSO pam_start(3), pam_authenticate(3), pam_chauthtok(3), pam_strerror(3), pam(7)Linux-PAM Manual 06/04/2011 PAM_ACCT_MGMT(3)
Hi All,
When I execute a command on Unix and it says 'Permission denied'. What could be the reason and how can it be resolved?
Many thanks,
David (2 Replies)
My SSH version is OpenSSH_5.0p1 and it is not prompting for new password and it is saying that when password expired "Permission denied". Please some one help me regarding this
$ ssh devdhq4
"Use is subject to monitoring by First American CREDCO personnel. Any
Criminal activity or wrongdoing... (1 Reply)
I have Windows AD server and all of the linux computers are joined to AD.
Recently, 2FA has been activated, I wish to exclude some of the domain service accounts from 2FA
# less /etc/pam_radius_acl.conf
sshd:*
# /etc/pam.d/sshd
auth required pam_sepermit.so
auth requisite... (0 Replies)