Linux and UNIX Man Pages

Linux & Unix Commands - Search Man Pages

pam_localuser(8) [redhat man page]

pam_localuser(8)					   System Administrator's Manual					  pam_localuser(8)

NAME
pam_localuser - require users to be listed in /etc/passwd SYNOPSIS
account sufficient /lib/security/pam_localuser.so args account required /lib/security/pam_wheel.so group=devel DESCRIPTION
pam_localuser.so exists to help implement site-wide login policies, where they typically include a subset of the network's users and a few accounts that are local to a particular workstation. Using pam_localuser.so and pam_wheel.so or pam_listfile.so is an effective way to restrict access to either local users and/or a subset of the network's users. This could also be implemented using pam_listfile.so and a very short awk script invoked by cron, but it's common enough to have been sepa- rated out. ARGUMENTS
debug turns on debugging file=FILE uses a file other than /etc/passwd. FILES
/etc/passwd BUGS
Let's hope not, but if you find any, please report them via the "Bug Track" link at http://bugzilla.redhat.com/bugzilla/ AUTHOR
Nalin Dahyabhai <nalin@redhat.com> Red Hat 2000/7/21 pam_localuser(8)

Check Out this Related Man Page

PAM_LOCALUSER(8)						 Linux-PAM Manual						  PAM_LOCALUSER(8)

NAME
pam_localuser - require users to be listed in /etc/passwd SYNOPSIS
pam_localuser.so [debug] [file=/path/passwd] DESCRIPTION
pam_localuser is a PAM module to help implementing site-wide login policies, where they typically include a subset of the network's users and a few accounts that are local to a particular workstation. Using pam_localuser and pam_wheel or pam_listfile is an effective way to restrict access to either local users and/or a subset of the network's users. This could also be implemented using pam_listfile.so and a very short awk script invoked by cron, but it's common enough to have been separated out. OPTIONS
debug Print debug information. file=/path/passwd Use a file other than /etc/passwd. MODULE TYPES PROVIDED
All module types (account, auth, password and session) are provided. RETURN VALUES
PAM_SUCCESS The new localuser was set successfully. PAM_SERVICE_ERR No username was given. PAM_USER_UNKNOWN User not known. EXAMPLES
Add the following line to /etc/pam.d/su to allow only local users in group wheel to use su. account sufficient pam_localuser.so account required pam_wheel.so FILES
/etc/passwd Local user account information. SEE ALSO
pam.conf(5), pam.d(5), pam(7) AUTHOR
pam_localuser was written by Nalin Dahyabhai <nalin@redhat.com>. Linux-PAM Manual 06/04/2011 PAM_LOCALUSER(8)
Man Page

7 More Discussions You Might Find Interesting

1. UNIX for Advanced & Expert Users

LDAP client issue

Hello, I'm new to Centos and to openldap. I am by trade a Solaris Admin. I'm experimenting with openldap and thought Linux would be easier to install and setup openldap on, so far this is true. The problem I'm having is that I can't get the client server to authenticate to the openldap server. I... (1 Reply)
Discussion started by: bitlord
1 Replies

2. Red Hat

SSH not working

Hi, I have a server running RHEL 6.0. While logging in through root ,I can login.But if I try to login through "integ" user,I am unable to login. /var/log/secure messages::: May 20 15:25:23 punsyncserv su: pam_unix(su-l:session): session opened for user integ by root(uid=0) May 20 15:29:44... (4 Replies)
Discussion started by: nowornever
4 Replies

3. Red Hat

RHEL 6, incorrect logins, never lock.

i've been searching the WEB, and editing my /etc/pam.d/system-auth,passwd-auth,sshd. but even a thousand wrong logins, my account doesnt lock. thanks # cat system-auth-ac #%PAM-1.0 # This file is auto-generated. # User changes will be destroyed the next time authconfig is run. auth ... (2 Replies)
Discussion started by: invinzin21
2 Replies

4. Emergency UNIX and Linux Support

LDAP and AD Authentication Query

Hi Friends, I have below scenarios . dom1.test.com - LDAP dom2.test.com - AD Requirement is establish a trust relation between LDAP and AD server in such a way that if any user login on LDAP managed authentication server with dom1\username -> get authenticated by LDAP host ... (2 Replies)
Discussion started by: Shirishlnx
2 Replies

5. Red Hat

Password policy for root

Hi, I am unable to enforce password complexity policy for root user. (other users are working) on RHEL 6.2. Anything wrong with system-auth parameters? PLease help.. vi /etc/pam.d/system-auth #%PAM-1.0 # This file is auto-generated. # User changes will be destroyed the next time... (1 Reply)
Discussion started by: suresh3566
1 Replies

6. Linux

User can't "su -" to root

Hello. I have a RHEL 7.2 where a regular user can't make a "su -" to reach root account: server532:t711740:/$ id uid=75456(t711740) gid=10000(personales) groups=10000(personales),10(wheel) tehrh532:t711740:/$ su - Password: su: Permission denied But can make "sudo su -"... (2 Replies)
Discussion started by: Gabriander
2 Replies

7. UNIX for Advanced & Expert Users

SOCKS proxy & PAM configuration exposure

I've got a problem with a proxy configuration. We have an LDAP group that lists all users who are authorised to use the proxy to FTP (usually Filezilla) out to the world, and by implication those not in the group should be denied. My users are delighted that this has been enabled and those that... (9 Replies)
Discussion started by: rbatte1
9 Replies