Linux and UNIX Man Pages

Linux & Unix Commands - Search Man Pages

ilogind(1m) [hpux man page]

ilogind(1M)															       ilogind(1M)

NAME
ilogind - Interface for libpam_dce.sl and libnss_dce.sl with DCE Description is an interface daemon for libpma_dce.sl (see pam_dce(5)),and libnss_dce.sl with DCE (/opt/dce/sbin/ilogind). starts up when integrated login is activated using the utility. See auth.adm(5). For the services in file that have libpam_dce.sl as the module to provide any of the authentication, account, management, session and pass- word services libpam_dce.sl sends the requests to which in turn interacts with DCE and services the requests. The results of these requests are returned to libpam_dce.sl. services the name service requests specified in If is one of the repository databases for passwd and/or group entries then, libnss_dce.sl services the corresponding name type requests (all calls to libnss_dce.sl sends the name type requests to which in turn calls the DCE reg- istry APIs to get them serviced and returns the result back to libnss_dce.sl A file named DEBUG can be created in the directory with the setuid bit set, for debugging purposes. So, if ilogind dumps core, it can be located in ENVIRONMENT VARIABLES
can be used to set the cache limit. The default value for this variable is 256. specifies the life of the password/group entry, which is 60 seconds. WARNING
In unix, for any calls, if the length of each line in /etc/group file exceeds the limit specified by LINE_MAX, it will return a NULL value. Refer group(4) for more details. However, DCE will return a valid entry with members upto the size specified by the return value of sysconf(_SC_GETGR_R_SIZE_MAX). This value is analogous to the LINE_MAX value. In case of file, the number of members in a group are lim- ited to 50. Members exceeding the count 50 will be discarded. Also, entries with duplicate group names are not supported in the override file. FILES
Configuration file for pluggable authentication modules Configuration file for the name-service switch AUTHOR
was developed by Hewlett Packard. SEE ALSO
auth.adm(5), pam_dce(5), pam.conf(4), getgrent(3C), getpwent(3C), groups(1), passwd(1) passwd_override(5) group_override(5) sysconf(2) HP DCE
ilogind(1M)

Check Out this Related Man Page

pam_dce(5)																pam_dce(5)

NAME
pam_dce - authentication, account, and password management PAM functions for DCE SYNOPSIS
/usr/lib/security/libpam_dce.so.1 DESCRIPTION
The DCE PAM modules allow integration of DCE into the system entry services (such as login, telnet, rlogin, ftp) through the pam.conf(4) file. The DCE service module for PAM consists of the following three modules: the authentication module, the account management module, and the password management module. All three modules are supported through the same loadable library, /usr/lib/security/libpam_dce.so.1 is the interface that services the requests from These requests will be communicated to the DCE security server, which in turn sends the response back to ilogind. This response is then sent back to /usr/lib/security/libpam_dce.so.1. Authentication Module The authentication module certifies the identity of a user and the user's credentials. It passes the authentication key derived from the user's password to the DCE Security Service. The Security Service then uses the authentication key to certify the user and the user's cre- dentials. The following options can be passed to the authentication module through the pam.conf(4) file: debug Turn on syslog debugging at the LOG_DEBUG level. nowarn Turn off warning messages about not being able to acquire DCE credentials. use_first_pass Use the initial password (entered when the user is authenticated to the first authentication module in the stack) to authenticate with DCE. If the user can not be authenticated or if this is the first authentication module in the stack, quit and do not prompt a password. It is recommended that this option be used only if the authentication mod- ule is designated as optional in the pam.conf(4) configuration file. try_first_pass Use the initial password (entered when the user is authenticated to the first authentication module in the PAM stack) to authenticate with DCE. If the user cannot be authenticated or if this is the first authentication module in the stack, prompt for a password. A user must be authenticated and the user's credentials set before a system entry service can access any file directories owned by the user that are mounted through DTS. Account Management Module The account management module provides a function to perform account management (pam_sm_acct_mgmt(3)). sends a request to the DCE implementation of pam_sm_acct_mgmt(3) function which retrieves the user's account and password expiration information from the DCE Security Server and verifies that the user's account and password have not expired. The following options can be passed to the account module through the pam.conf(4) file: debug Turn on syslog debugging at the LOG_DEBUG level. nowarn Turn off warning messages displayed when a user's account and/or password are going to expire. pam_sm_acct_mgmt(3) calls the function sec_login_inquire_net_info(3) to retrieve information about when a user's account and/or password is going to expire. Password Management Module The password management module provides a function to change passwords (pam_sm_chauthtok(3)). The following options can be passed to the password module through the pam.conf(4) file: debug Turn on syslog debugging at the LOG_DEBUG level. nowarn Turn off warning messages about not being able to change passwords. try_first_pass Use the initial password (entered to the first password module in the PAM stack) to authenticate with DCE. If the user cannot be authenticated or if this is the first password module in the stack, prompt for a password. use_first_pass Use the initial password (entered to the first password module in the PAM stack) to authenticate with DCE. If user cannot be authenticated or if this is the first password module in the stack, quit and do not prompt for a password. It is recommended that this option be used only if the DCE password module is designated as optional in the pam.conf(4) configuration file. SEE ALSO
pam(3), sec_login_setup_identity(3), sec_login_valid_and_cert_ident(3), sec_login_set_context(3), sec_login_inquire_net_info(3), pam.conf(4), pam_unix(5) ilogind(1m) HP DCE
pam_dce(5)
Man Page