Linux and UNIX Man Pages

Linux & Unix Commands - Search Man Pages

authconfig-gtk(8) [centos man page]

AUTHCONFIG-GTK(8)					      System Manager's Manual						 AUTHCONFIG-GTK(8)

authconfig-gtk, system-config-authentication - GUI utility for configuring user identity and system authentication services SYNOPSIS
authconfig-gtk [--nox] [--updateall] [--firstboot] DESCRIPTION
authconfig-gtk provides a simple graphical user interface for configuring user identity and system authentication services. It provides basic configuration options to handle NIS, LDAP, Kerberos 5, and Winbind client configuration. OPTIONS
If the --nox option is specified, authconfig command line utility is run instead of the GUI. The --updateall option forces overwriting of all configuration files not only the files affected by the changes made in the user interac- tion with the GUI. This option can be useful in case the configuration files are broken by manual editing. The --firstboot option is to be used only when firstboot utility runs the GUI during the first setup of the system after installation. RETURN CODES
authconfig-gtk returns 0 on success, non zero on error. SEE ALSO
authconfig(8), system-auth-ac(5) AUTHORS
Nalin Dahyabhai <>, Preston Brown <>, Matt Wilson <>, Tomas Mraz <> Red Hat, Inc. 31 March 2010 AUTHCONFIG-GTK(8)

Check Out this Related Man Page

SYSTEM-AUTH-AC(5)						File Formats Manual						 SYSTEM-AUTH-AC(5)

system-auth-ac, password-auth-ac, smartcard-auth-ac, fingerprint-auth-ac, postlogin-ac - Common configuration files for PAMified services written by authconfig(8) SYNOPSIS
/etc/pam.d/system-auth-ac DESCRIPTION
The purpose of this configuration file is to provide common configuration file for all applications and service daemons calling PAM library. The system-auth configuration file is included from all individual service configuration files with the help of the include directive. When authconfig(8) writes the system PAM configuration file it replaces the default system-auth file with a symlink pointing to system-auth-ac and writes the configuration to this file. The symlink is not changed on subsequent configuration changes even if it points elsewhere. This allows system administrators to override the configuration written by authconfig. The authconfig now writes the authentication modules also into additional PAM configuration files /etc/pam.d/password-auth-ac, /etc/pam.d/smartcard-auth-ac, and /etc/pam.d/fingerprint-auth-ac. These configuration files contain only modules which perform authentica- tion with the respective kinds of authentication tokens. For example /etc/pam.d/smartcard-auth[-ac] will not contain pam_unix and pam_ldap modules and /etc/pam.d/password-auth[-ac] will not contain pam_pkcs11 and pam_fprintd modules. The file /etc/pam.d/postlogin-ac contains common services to be invoked after login. An example can be a module that encrypts an user's filesystem or user's keyring and is decrypted by his password. The PAM configuration files of services which are accessed by remote connections such as sshd or ftpd now include the /etc/pam.d/password- auth configuration file instead of /etc/pam.d/system-auth. EXAMPLE
Configure system to use pam_tally2 for configuration of maximum number of failed logins. Also call pam_access to verify if access is allowed. Make system-auth symlink point to system-auth-local which contains: auth requisite auth requisite deny=3 lock_time=30 unlock_time=3600 auth include system-auth-ac account required account include system-auth-ac password include system-auth-ac session include system-auth-ac BUGS
None known. SEE ALSO
authconfig(8), authconfig-gtk(8), pam(8), system-auth(5) Red Hat, Inc. 2010 March 31 SYSTEM-AUTH-AC(5)
Man Page