Linux and UNIX Man Pages

Linux & Unix Commands - Search Man Pages

pam_smbfs_login(5) [opensolaris man page]

pam_smbfs_login(5)					Standards, Environments, and Macros					pam_smbfs_login(5)

NAME
pam_smbfs_login - PAM user credential authentication module for SMB/CIFS client login SYNOPSIS
pam_smb_cred.so.1 DESCRIPTION
The pam_smbfs_login module implements pam_sm_setcred(3PAM) to provide functions that act equivalently to the smbutil(1) login command. This optional functionality is meant to be used only in environments that do not run Active Directory or Kerberos, but which synchronize passwords between Solaris clients and their CIFS/SMB servers. This module permits the login password to be stored as if the smbutil(1) login command was used to store a password for PAM_USER in the user or system default domain. The choice of default domain is the first of the following: -Domain entry specified in the default section of the $HOME/.nsmbrc file, if readable. -Domain entry specified in the default section shown by the sharectl get smbfs command. -String WORKGROUP. Because pam_smbfs_login runs as root during the login process, a $HOME/.nsmbrc file accessed through NFS may only be readable if the file permits reads by others. This conflicts with the requirement that passwords stored in $HOME/.nsmbrc are ignored when permissions are open. To use this functionality, add the following line to the /etc/pam.conf file: login auth optional pam_smbfs_login.so.1 Authentication service modules must implement both pam_sm_authenticate(3PAM) and pam_sm_setcred(3PAM). In this module, pam_sm_authenti- cate(3PAM) always returns PAM_IGNORE. The pam_sm_setcred(3PAM) function accepts the following flags: PAM_REFRESH_CRED Returns PAM_IGNORE. PAM_SILENT Suppresses messages. PAM_ESTABLISH_CRED PAM_REINITIALIZE_CRED Stores the authentication token for PAM_USER in the same manner as the smbutil(1) login command. PAM_DELETE_CRED Deletes the stored password for PAM_USER in the same manner as the smbutil(1) logout command. The following options can be passed to the pam_smbfs_login module: debug Produces syslog(3C) debugging information at the LOG_AUTH or LOG_DEBUG level. nowarn Suppresses warning messages. FILES
$HOME/.nsmbrc Find default domain, if present. ERRORS
Upon successful completion of pam_sm_setcred(3PAM), PAM_SUCCESS is returned. The following error codes are returned upon error: PAM_USER_UNKNOWN User is unknown. PAM_AUTHTOK_ERR Password is bad. PAM_AUTH_ERR Domain is bad. PAM_SYSTEM_ERR System error. ATTRIBUTES
See attributes(5) for descriptions of the following attribute: +-----------------------------+-----------------------------+ | ATTRIBUTE TYPE | ATTRIBUTE VALUE | +-----------------------------+-----------------------------+ |Interface Stability | Committed | +-----------------------------+-----------------------------+ |MT Level | MT-Safe with exceptions | +-----------------------------+-----------------------------+ SEE ALSO
smbutil(1), syslog(3C), libpam(3LIB), pam(3PAM), pam_setcred(3PAM), pam_sm(3PAM), pam_sm_authenticate(3PAM), pam_sm_chauthtok(3PAM), pam_sm_setcred(3PAM), pam.conf(4), attributes(5), smbfs(7FS) NOTES
The interfaces in libpam(3LIB) are MT-Safe only if each thread within the multi-threaded application uses its own PAM handle. SunOS 5.11 25 Sep 2008 pam_smbfs_login(5)

Check Out this Related Man Page

pam_dial_auth(5)					Standards, Environments, and Macros					  pam_dial_auth(5)

NAME
pam_dial_auth - authentication management PAM module for dialups SYNOPSIS
pam_dial_auth.so.1 DESCRIPTION
The pam_dial_auth module implements pam_sm_authenticate(3PAM) which authenticates the user according to the dialups(4) and d_passwd(4) files configuration. Authentication service modules must implement both pam_sm_authenticate() and pam_sm_setcred(). pam_sm_setcred() in this module always returns PAM_IGNORE. The value of the PAM_TTY item is checked against entries in dialups(4). If there is a match, the user's shell is compared against entries in d_passwd(4). If there is a matching entry, the user is prompted for a password which is validated against the entry found. The following option may be passed in to this service module: debug syslog(3C) debugging information at LOG_DEBUG level. ERRORS
If dialups(4) is not present, PAM_IGNORE is returned. Upon successful completion of pam_sm_authenticate(), PAM_SUCCESS is returned. The following error codes are returned upon error: PAM_AUTH_ERR Authentication failure. PAM_SERVICE_ERR Error in the calling service, PAM_TTY is not set. PAM_SYSTEM_ERR System error (d_passwd(4) is not present). PAM_USER_UNKNOWN No account is present for user. ATTRIBUTES
See attributes(5) for a description of the following attributes: +-----------------------------+-----------------------------+ | ATTRIBUTE TYPE | ATTRIBUTE VALUE | +-----------------------------+-----------------------------+ |MT Level |MT-Safe with exceptions | +-----------------------------+-----------------------------+ SEE ALSO
pam(3PAM), pam_authenticate(3PAM), pam_sm_authenticate(3PAM), d_passwd(4), dialups(4), libpam(3LIB), pam.conf(4), attributes(5), pam_auth- tok_check(5), pam_authtok_get(5), pam_authtok_store(5), pam_dhkeys(5), pam_passwd_auth(5), pam_unix_account(5), pam_unix_auth(5), pam_unix_session(5) NOTES
The interfaces in libpam(3LIB) are MT-Safe only if each thread within the multi-threaded application uses its own PAM handle. The pam_unix(5) module is no longer supported. Similar functionality is provided by pam_authtok_check(5), pam_authtok_get(5), pam_auth- tok_store(5), pam_dhkeys(5), pam_passwd_auth(5), pam_unix_account(5), pam_unix_auth(5), and pam_unix_session(5). SunOS 5.10 9 Sept 2004 pam_dial_auth(5)
Man Page