PAM_ROOTOK(8) BSD System Manager's Manual PAM_ROOTOK(8)NAME
pam_rootok -- RootOK PAM module
SYNOPSIS
[service-name] module-type control-flag pam_rootok [options]
DESCRIPTION
The RootOK authentication service module for PAM, pam_rootok provides functionality for only one PAM category: authentication. In terms of
the module-type parameter, this is the ``auth'' feature. It also provides a null function for session management.
RootOK Authentication Module
The RootOK authentication component (pam_sm_authenticate()), always returns success for the superuser; i.e., if getuid(2) returns 0.
The following options may be passed to the authentication module:
debug syslog(3) debugging information at LOG_DEBUG level.
no_warn suppress warning messages to the user. These messages include reasons why the user's authentication attempt was declined.
SEE ALSO getuid(2), pam.conf(5), pam(8)BSD July 8, 2001 BSD
Check Out this Related Man Page
PAM_SELF(8) BSD System Manager's Manual PAM_SELF(8)NAME
pam_self -- Self PAM module
SYNOPSIS
[service-name] module-type control-flag pam_self [options]
DESCRIPTION
The Self authentication service module for PAM, pam_self provides functionality for only one PAM category: authentication. In terms of the
module-type parameter, this is the ``auth'' feature.
Self Authentication Module
The Self authentication component (pam_sm_authenticate()), returns success if and only if the target user's user ID is identical with the
current real user ID. If the current real user ID is zero, authentication will fail, unless the allow_root option was specified.
The following options may be passed to the authentication module:
debug syslog(3) debugging information at LOG_DEBUG level.
no_warn suppress warning messages to the user. These messages include reasons why the user's authentication attempt was declined.
allow_root do not automatically fail if the current real user ID is 0.
SEE ALSO getuid(2), pam.conf(5), pam(8)AUTHORS
The pam_self module and this manual page were developed for the FreeBSD Project by ThinkSec AS and NAI Labs, the Security Research Division
of Network Associates, Inc. under DARPA/SPAWAR contract N66001-01-C-8035 (``CBOSS''), as part of the DARPA CHATS research program.
BSD December 5, 2001 BSD
Hello, I can ssh as root directly, but when login as normal user, I cant su to root:
user@server:~% su
Password:
and in the /var/log/messages:
session opened for user root by user(uid=501)
session closed for user root
Im sure the root password is correct, any pointer? (14 Replies)
Hi,
I am not able to login on my linux server through my some user :-
when i login through root and try to login it gives the following error :-
#su - oracle
su: incorrect password
i have check the entry of oracle user is there in /etc/passwd file also... (11 Replies)
Hi,
I find there is some customized linux with application.
When I use login account root and type the password.
It is not allow to login.
But if I login with specified user and password.
Then I use command "su - " and type root passwd.
It allow you to switch to "root" account .
Or if i... (14 Replies)
Hello.
I have a RHEL 7.2 where a regular user can't make a "su -" to reach root account:
server532:t711740:/$ id
uid=75456(t711740) gid=10000(personales) groups=10000(personales),10(wheel)
tehrh532:t711740:/$ su -
Password:
su: Permission denied
But can make "sudo su -"... (2 Replies)