Linux and UNIX Man Pages

Linux & Unix Commands - Search Man Pages

pam_rootok(8) [freebsd man page]

PAM_ROOTOK(8)						    BSD System Manager's Manual 					     PAM_ROOTOK(8)

NAME
pam_rootok -- RootOK PAM module SYNOPSIS
[service-name] module-type control-flag pam_rootok [options] DESCRIPTION
The RootOK authentication service module for PAM, pam_rootok provides functionality for only one PAM category: authentication. In terms of the module-type parameter, this is the ``auth'' feature. It also provides a null function for session management. RootOK Authentication Module The RootOK authentication component (pam_sm_authenticate()), always returns success for the superuser; i.e., if getuid(2) returns 0. The following options may be passed to the authentication module: debug syslog(3) debugging information at LOG_DEBUG level. no_warn suppress warning messages to the user. These messages include reasons why the user's authentication attempt was declined. SEE ALSO
getuid(2), pam.conf(5), pam(8) BSD
July 8, 2001 BSD

Check Out this Related Man Page

PAM_SELF(8)						    BSD System Manager's Manual 					       PAM_SELF(8)

NAME
pam_self -- Self PAM module SYNOPSIS
[service-name] module-type control-flag pam_self [options] DESCRIPTION
The Self authentication service module for PAM, pam_self provides functionality for only one PAM category: authentication. In terms of the module-type parameter, this is the ``auth'' feature. Self Authentication Module The Self authentication component (pam_sm_authenticate()), returns success if and only if the target user's user ID is identical with the current real user ID. If the current real user ID is zero, authentication will fail, unless the allow_root option was specified. The following options may be passed to the authentication module: debug syslog(3) debugging information at LOG_DEBUG level. no_warn suppress warning messages to the user. These messages include reasons why the user's authentication attempt was declined. allow_root do not automatically fail if the current real user ID is 0. SEE ALSO
getuid(2), pam.conf(5), pam(8) AUTHORS
The pam_self module and this manual page were developed for the FreeBSD Project by ThinkSec AS and NAI Labs, the Security Research Division of Network Associates, Inc. under DARPA/SPAWAR contract N66001-01-C-8035 (``CBOSS''), as part of the DARPA CHATS research program. BSD
December 5, 2001 BSD
Man Page

4 More Discussions You Might Find Interesting

1. Linux

Cant su to root

Hello, I can ssh as root directly, but when login as normal user, I cant su to root: user@server:~% su Password: and in the /var/log/messages: session opened for user root by user(uid=501) session closed for user root Im sure the root password is correct, any pointer? (14 Replies)
Discussion started by: bsddaemon
14 Replies

2. Linux

Not able to login to my Linux server

Hi, I am not able to login on my linux server through my some user :- when i login through root and try to login it gives the following error :- #su - oracle su: incorrect password i have check the entry of oracle user is there in /etc/passwd file also... (11 Replies)
Discussion started by: amity
11 Replies

3. Red Hat

Su root or login root

Hi, I find there is some customized linux with application. When I use login account root and type the password. It is not allow to login. But if I login with specified user and password. Then I use command "su - " and type root passwd. It allow you to switch to "root" account . Or if i... (14 Replies)
Discussion started by: chuikingman
14 Replies

4. Linux

User can't "su -" to root

Hello. I have a RHEL 7.2 where a regular user can't make a "su -" to reach root account: server532:t711740:/$ id uid=75456(t711740) gid=10000(personales) groups=10000(personales),10(wheel) tehrh532:t711740:/$ su - Password: su: Permission denied But can make "sudo su -"... (2 Replies)
Discussion started by: Gabriander
2 Replies