11-18-2015
Not every system uses or even allows all possible login "types". If you read the pam manpage or vi pam.conf in the /etc directory tree you can see what your system does. Also note that you can deny interactive ssh sessions on a per user or per group basis - see your sshd.conf file. This affects the types of logins that you will see.
LDAP, for instance, can be set up to employ a remote server or to use the local box as the ldap server. What you may see in the auth logs will be different - at least on Solaris.
edit: As a second thought - please share what are you trying to accomplish ultimately - NOT how you think it should be done.
9 More Discussions You Might Find Interesting
1. UNIX for Dummies Questions & Answers
I would like to know as what all Unix types can be installed on PC, i.e. Intel Pentium processor and having HDD of let us say 4 GB or so? What RAM would be sufficient? I know for sure that Linux is free and can be installed on PC, can some one tell about other UNIX types which can be obtained for... (3 Replies)
Discussion started by: SANJAY
3 Replies
2. UNIX for Dummies Questions & Answers
Hello,
I've search this site many times and ave not been able to find my answer. So I'm going to post my question....(duh)
Ok.
I'm wanting to know what file types does unix support.
if you can try and list them like this:
php, .php
or somthing like that.
plus don't forget that I said I... (3 Replies)
Discussion started by: dgames
3 Replies
3. UNIX for Dummies Questions & Answers
Hi everyone,
I am a newbies to Unix and hope someone can help me on:
1. Do anyone has batch file example that can be logon to a unix sever through telnet and exec a nohup command without typing in username and passward everytime ?
2. A java script exmaple for doing the same logon so it... (1 Reply)
Discussion started by: oht
1 Replies
4. Windows & DOS: Issues & Discussions
I am not an expert in Unix at all. My knowledge of Unix is average. We have a couple of Unix servers, Solaris and Linux, which run mostly web servers, and Oracle databases. Currently users have multiple user IDs for Unix and AD applications. Is it possible to make use of the Windows Active... (2 Replies)
Discussion started by: speriya
2 Replies
5. Solaris
Experts,
Is there any way to know which authentication method the user used to login into the box? I mean, is possible to identify if an active user had logged using keys or password for example?
Let me clarify: we have a script that we want to allow users to execute only if they have used... (2 Replies)
Discussion started by: fmattos
2 Replies
6. Solaris
I am using solaris unix 8.2 version. I want to bypass password authentication for sftp. Can you please give some ideas on this. thanks.Regards. (4 Replies)
Discussion started by: vijill
4 Replies
7. Shell Programming and Scripting
Hello - Is there a command/way we can find out, what shells are supported on a Unix machine?
Please let me know.
Thanks,
Manju (3 Replies)
Discussion started by: manju--
3 Replies
8. AIX
We are looking at using Tivoli Directory Server (LDAP) or Active Directory 2003 for authentication. I wanted to get some feedback from the community. Our goal is to do it the simplest, easiest, and cheapest way that allows for centralized user authentication. We are mainly an AIX environment with... (3 Replies)
Discussion started by: x96riley3
3 Replies
9. Shell Programming and Scripting
Hi All,
My Servers are enabled with a secondary authentication of login. Whenever we are logging in to the servers with a common id it is asking like something " Enet your personal id and password" which has been created by UNIX admins previously.
Just curious how to achieve this... (1 Reply)
Discussion started by: Showdown
1 Replies
LEARN ABOUT CENTOS
pam_warn
PAM_WARN(8) Linux-PAM Manual PAM_WARN(8)
NAME
pam_warn - PAM module which logs all PAM items if called
SYNOPSIS
pam_warn.so
DESCRIPTION
pam_warn is a PAM module that logs the service, terminal, user, remote user and remote host to syslog(3). The items are not probed for, but
instead obtained from the standard PAM items. The module always returns PAM_IGNORE, indicating that it does not want to affect the
authentication process.
OPTIONS
This module does not recognise any options.
MODULE TYPES PROVIDED
The auth, account, password and session module types are provided.
RETURN VALUES
PAM_IGNORE
This module always returns PAM_IGNORE.
EXAMPLES
#%PAM-1.0
#
# If we don't have config entries for a service, the
# OTHER entries are used. To be secure, warn and deny
# access to everything.
other auth required pam_warn.so
other auth required pam_deny.so
other account required pam_warn.so
other account required pam_deny.so
other password required pam_warn.so
other password required pam_deny.so
other session required pam_warn.so
other session required pam_deny.so
SEE ALSO
pam.conf(5), pam.d(5), pam(8)
AUTHOR
pam_warn was written by Andrew G. Morgan <morgan@kernel.org>.
Linux-PAM Manual 09/19/2013 PAM_WARN(8)