Linux and UNIX Man Pages

Linux & Unix Commands - Search Man Pages

pam_mkhomedir(8) [debian man page]

PAM_MKHOMEDIR(8)						 Linux-PAM Manual						  PAM_MKHOMEDIR(8)

NAME
pam_mkhomedir - PAM module to create users home directory SYNOPSIS
pam_mkhomedir.so [silent] [umask=mode] [skel=skeldir] DESCRIPTION
The pam_mkhomedir PAM module will create a users home directory if it does not exist when the session begins. This allows users to be present in central database (such as NIS, kerberos or LDAP) without using a distributed file system or pre-creating a large number of directories. The skeleton directory (usually /etc/skel/) is used to copy default files and also sets a umask for the creation. The new users home directory will not be removed after logout of the user. OPTIONS
silent Don't print informative messages. umask=mask The user file-creation mask is set to mask. The default value of mask is 0022. skel=/path/to/skel/directory Indicate an alternative skel directory to override the default /etc/skel. MODULE TYPES PROVIDED
Only the session module type is provided. RETURN VALUES
PAM_BUF_ERR Memory buffer error. PAM_CRED_INSUFFICIENT Insufficient credentials to access authentication data. PAM_PERM_DENIED Not enough permissions to create the new directory or read the skel directory. PAM_USER_UNKNOWN User not known to the underlying authentication module. PAM_SUCCESS Environment variables were set. FILES
/etc/skel Default skel directory EXAMPLES
A sample /etc/pam.d/login file: auth requisite pam_securetty.so auth sufficient pam_ldap.so auth required pam_unix.so auth required pam_nologin.so account sufficient pam_ldap.so account required pam_unix.so password required pam_unix.so session required pam_mkhomedir.so skel=/etc/skel/ umask=0022 session required pam_unix.so session optional pam_lastlog.so session optional pam_mail.so standard SEE ALSO
pam.d(5), pam(7). AUTHOR
pam_mkhomedir was written by Jason Gunthorpe <jgg@debian.org>. Linux-PAM Manual 06/04/2011 PAM_MKHOMEDIR(8)

Check Out this Related Man Page

PAM_TIMESTAMP(8)						 Linux-PAM Manual						  PAM_TIMESTAMP(8)

NAME
pam_timestamp - Authenticate using cached successful authentication attempts SYNOPSIS
pam_timestamp.so [timestamp_timeout=number] [verbose] [debug] DESCRIPTION
In a nutshell, pam_timestamp caches successful authentication attempts, and allows you to use a recent successful attempt as the basis for authentication. This is similar mechanism which is used in sudo. When an application opens a session using pam_timestamp, a timestamp file is created in the timestampdir directory for the user. When an application attempts to authenticate the user, a pam_timestamp will treat a sufficiently recent timestamp file as grounds for succeeding. OPTIONS
timestamp_timeout=number How long should pam_timestamp treat timestamp as valid after their last modification date (in seconds). Default is 300 seconds. verbose Attempt to inform the user when access is granted. debug Turns on debugging messages sent to syslog(3). MODULE TYPES PROVIDED
The auth and session module types are provided. RETURN VALUES
PAM_AUTH_ERR The module was not able to retrieve the user name or no valid timestamp file was found. PAM_SUCCESS Everything was successful. PAM_SESSION_ERR Timestamp file could not be created or updated. NOTES
Users can get confused when they are not always asked for passwords when running a given program. Some users reflexively begin typing information before noticing that it is not being asked for. EXAMPLES
auth sufficient pam_timestamp.so verbose auth required pam_unix.so session required pam_unix.so session optional pam_timestamp.so FILES
/var/run/sudo/... timestamp files and directories SEE ALSO
pam_timestamp_check(8), pam.conf(5), pam.d(5), pam(8) AUTHOR
pam_tally was written by Nalin Dahyabhai. Linux-PAM Manual 06/04/2011 PAM_TIMESTAMP(8)
Man Page