Sponsored Content
Top Forums Programming Gamit installation error: /libraries/comlib/com_lib.a(pickfn_gftn.o)' is incompatible with i386:x86- Post 303012467 by rbatte1 on Monday 5th of February 2018 04:57:46 AM
 

9 More Discussions You Might Find Interesting

1. Solaris

Installation on X86

Hi...., Actually i want to install sun OS 9 in intel system.while installing with CD,system is booting and i'm getting error is "boot panic error".i'm using SATA harddisk.pls give me the solutions for this error. (2 Replies)
Discussion started by: rjay.com
2 Replies

2. Solaris

Solaris 10 installation on X86

During installation on the desktop the error message crops up. "Failed to initialize hotplug controllers". Any help. Thanks. Chad (3 Replies)
Discussion started by: Mike Chad
3 Replies

3. Solaris

Solaris 10 x86 Installation Will Not Boot From CD Disks

Problem: Am trying to install Solaris 10 x86 on a desktop PC (PC details unspecified) from downloaded iso images (5 in all) on 5 CD disks. These were downloaded from the Sun website and unzipped. I install Disk 1of 5 into the CD drive and then restart the machine, thinkng that it will launch... (5 Replies)
Discussion started by: RobSand
5 Replies

4. Solaris

Installation of Solaris 10 on X86 Platform on the same Disk having XP SP2

Plz help me in installing solaris 10 11/06 on XP sp2 system having only one hard disk (1 Reply)
Discussion started by: skargarika
1 Replies

5. Solaris

Jumpstart Installation from X86 machine

Hi friends , i have on ultra 10 Sparc machine . Due to some problem my OS is fully corrupted , so i am planning to install again but my problem is the cd drive in Ultra 10 machine is not working. Now i am planning to use Jumpstart installation method to install my server. But i... (4 Replies)
Discussion started by: vr_mari
4 Replies

6. Solaris

Can't have the GRUB menu for solaris x86 installation

Dears, I'm trying to install solaris x86 on sun x4170 M2 I started connecting consol to the machine but when I do the reset /SYS command nothing changed I can see that the /SYS is powered on but I can get the GRUB menu to start the installation of the solaris. the solaris DVD is already... (2 Replies)
Discussion started by: engwzwz
2 Replies

7. Solaris

Solaris 11 x86 installation troubles - 8G disk limit

Hi, I am trying to install Solaris 11 on an X86 machine. I am using the text install iso image burned to an optical disk. The system contains a single 500G SATA drive. When the system attempts to detect local disks, it reports that the disk only has a capacity of 8GB. How do I get... (2 Replies)
Discussion started by: jpoc
2 Replies

8. Solaris

Are SUNWaccu and SUNWless default packages of x86 installation ?

Hi, This question is not for troubleshooting, but want to get some clarification. In few of our Solaris-10 x86 servers, there are no SUNWaccu and SUNWless packages, so sar is not present. These are old servers, so not sure, when and how these were build. Now, there is a big push from application... (1 Reply)
Discussion started by: solaris_1977
1 Replies

9. Shell Programming and Scripting

Gamit installation error: showing Failure in make_gamit -- install_software terminated

what i should to do next? read full query first please!! harshbhu@harshbhu:/usr/local/gg/10.6/updates/Source$ sudo ./install_software sudo: unable to resolve host harshbhu install_software version 2017/06/29 GAMIT and GLOBK to be installed into /usr/local/gg/10.6/updates/Source If... (0 Replies)
Discussion started by: ankit lohar
0 Replies
pam_ssh_agent_auth(8)							PAM						     pam_ssh_agent_auth(8)

PAM_SSH_AGENT_AUTH
       This module provides authentication via ssh-agent.  If an ssh-agent listening at SSH_AUTH_SOCK can successfully authenticate that it has
       the secret key for a public key in the specified file, authentication is granted, otherwise authentication fails.

SUMMARY
/etc/pam.d/sudo: auth sufficient pam_ssh_agent_auth.so file=/etc/security/authorized_keys /etc/sudoers: Defaults env_keep += "SSH_AUTH_SOCK" This configuration would permit anyone who has an SSH_AUTH_SOCK that manages the private key matching a public key in /etc/security/authorized_keys to execute sudo without having to enter a password. Note that the ssh-agent listening to SSH_AUTH_SOCK can either be local, or forwarded. Unlike NOPASSWD, this still requires an authentication, it's just that the authentication is provided by ssh-agent, and not password entry. ARGUMENTS
file=<path to authorized_keys> Specify the path to the authorized_keys file(s) you would like to use for authentication. Subject to tilde and % EXPANSIONS (below) allow_user_owned_authorized_keys_file A flag which enables authorized_keys files to be owned by the invoking user, instead of root. This flag is enabled automatically whenever the expansions %h or ~ are used. debug A flag which enables verbose logging sudo_service_name=<service name you compiled sudo to use> (when compiled with --enable-sudo-hack) Specify the service name to use to identify the service "sudo". When the PAM_SERVICE identifier matches this string, and if PAM_RUSER is not set, pam_ssh_agent_auth will attempt to identify the calling user from the environment variable SUDO_USER. This defaults to "sudo". EXPANSIONS
~ -- same as in shells, a user's Home directory Automatically enables allow_user_owned_authorized_keys_file if used in the context of ~/. If used as ~user/, it would expect the file to be owned by 'user', unless you explicitely set allow_user_owned_authorized_keys_file %h -- User's Home directory Automatically enables allow_user_owned_authorized_keys_file %H -- The short-hostname %u -- Username %f -- FQDN EXAMPLES
in /etc/pam.d/sudo "auth sufficient pam_ssh_agent_auth.so file=~/.ssh/authorized_keys" The default .ssh/authorized_keys file in a user's home-directory "auth sufficient pam_ssh_agent_auth.so file=%h/.ssh/authorized_keys" Same as above. "auth sufficient pam_ssh_agent_auth.so file=~fred/.ssh/authorized_keys" If the home-directory of user 'fred' was /home/fred, this would expand to /home/fred/.ssh/authorized_keys. In this case, we have not specified allow_user_owned_authorized_keys_file, so this file must be owned by 'fred'. "auth sufficient pam_ssh_agent_auth.so file=/secure/%H/%u/authorized_keys allow_user_owned_authorized_keys_file" On a host named foobar.baz.com, and a user named fred, would expand to /secure/foobar/fred/authorized_keys. In this case, we specified allow_user_owned_authorized_keys_file, so fred would be able to manage that authorized_keys file himself. "auth sufficient pam_ssh_agent_auth.so file=/secure/%f/%u/authorized_keys" On a host named foobar.baz.com, and a user named fred, would expand to /secure/foobar.baz.com/fred/authorized_keys. In this case, we have not specified allow_user_owned_authorized_keys_file, so this file must be owned by root. v0.8 2009-08-09 pam_ssh_agent_auth(8)
All times are GMT -4. The time now is 10:26 PM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy