11-29-2016
Hi Robin,
What is in /etc/pam.d/system-auth ?
9 More Discussions You Might Find Interesting
1. UNIX for Advanced & Expert Users
I have suse (SLES 9) machine,I would like to know how to creat a PAM
configure file for ldap authentication and loading it using a "config"
argument to pam_ldap.so
Thanks for your help (0 Replies)
Discussion started by: hassan1
0 Replies
2. UNIX for Dummies Questions & Answers
Hi.
i am on solaris. I have changed pam configuration. Do i need to let pam re-read its configuration again? If so, how can i do it?
ps -ef | grep -i pam, returns no hits.
Rgds (0 Replies)
Discussion started by: yls177
0 Replies
3. IP Networking
i have the DNS and the web proxy services running on one of my sun machines....the funny thing is clients use the proxy server by addressing it with its IP address only....what i need is to assign it like...proxy.amu.edu.et......
my guess is the problem is the configuration with the DNS ...but i... (2 Replies)
Discussion started by: henokia4j
2 Replies
4. Red Hat
Hi,
I've configured two linux boxes to authenticate against Windows Active Directory using Kerberos while retrieving authorization data (uids, gids ,,,)from NIS.
The problem I ran into with my PAM configuration is that all authentication attempts succeed in order.i.e. if someone tried his... (0 Replies)
Discussion started by: geek.ksa
0 Replies
5. IP Networking
Can any one direct me to the resources where I can find in-depth instructions on Squid Proxy server and its configuration?
Thanks in advance.:) (1 Reply)
Discussion started by: admin_xor
1 Replies
6. UNIX for Advanced & Expert Users
Hello all,
I am trying to configure squid proxy server for different organizations. These organizations will have different blocked ports, different acls, etc. But, I can use only one proxy server for this purpose. Thinking of making a shell script with iptables and squid.
For an example: a... (1 Reply)
Discussion started by: admin_xor
1 Replies
7. Shell Programming and Scripting
This is a weird problem. Following is my code.
/opt/quest/bin/vastool configure pam sshd
/opt/quest/bin/vastool configure pam ssh
cat /etc/pam.conf | \
awk '$1=="ssh"||$1=="sshd"||$1=="emagent"{sub("prohibit","aix",$NF);}1' OFS='\t' > /etc/pam.conf
cat /etc/ssh/sshd_config | \
sed -e... (2 Replies)
Discussion started by: pjeedu2247
2 Replies
8. UNIX for Dummies Questions & Answers
Hello, i setup an open socks proxy on my remote vps:
ssh -f -N -D 0.0.0.0:1080 localhost
and then allowed only connections from IP of my home computer
iptables -A INPUT --src myhomeip -p tcp --dport 1080 -j ACCEPT
iptables -A INPUT -p tcp --dport 1080 -j REJECT
but it appears that im... (3 Replies)
Discussion started by: postcd
3 Replies
9. Shell Programming and Scripting
I have a list of ip socks / port(eg: 192.168.0.1 80). I would like to write a bash to test automatically these addresses in a loop with firefox. The problem is that firefox process stays alive even when firefox does not work because of wrong network settings. So I want to kill the process when the... (3 Replies)
Discussion started by: arpagon
3 Replies
LEARN ABOUT CENTOS
smartcard-auth
SYSTEM-AUTH(5) Linux-PAM Manual SYSTEM-AUTH(5)
NAME
system-auth - Common configuration file for PAMified services
SYNOPSIS
/etc/pam.d/system-auth /etc/pam.d/password-auth /etc/pam.d/fingerprint-auth /etc/pam.d/smartcard-auth
DESCRIPTION
The purpose of these configuration files are to provide a common interface for all applications and service daemons calling into the PAM
library.
The system-auth configuration file is included from nearly all individual service configuration files with the help of the substack direc-
tive.
The password-auth fingerprint-auth smartcard-auth configuration files are for applications which handle authentication from different types
of devices via simultaneously running individual conversations instead of one aggregate conversation.
NOTES
Previously these common configuration files were included with the help of the include directive. This limited the use of the different
action types of modules. With the use of substack directive to include these common configuration files this limitation no longer applies.
BUGS
None known.
SEE ALSO
pam(8), config-util(5), postlogin(5)
The three Linux-PAM Guides, for system administrators, module developers, and application developers.
Red Hat 2010 Dec 22 SYSTEM-AUTH(5)