pam_localuser(8) System Administrator's Manual pam_localuser(8)NAME
pam_localuser - require users to be listed in /etc/passwd
SYNOPSIS
account sufficient /lib/security/pam_localuser.so args
account required /lib/security/pam_wheel.so group=devel
DESCRIPTION
pam_localuser.so exists to help implement site-wide login policies, where they typically include a subset of the network's users and a few
accounts that are local to a particular workstation. Using pam_localuser.so and pam_wheel.so or pam_listfile.so is an effective way to
restrict access to either local users and/or a subset of the network's users.
This could also be implemented using pam_listfile.so and a very short awk script invoked by cron, but it's common enough to have been sepa-
rated out.
ARGUMENTS
debug turns on debugging
file=FILE
uses a file other than /etc/passwd.
FILES
/etc/passwd
BUGS
Let's hope not, but if you find any, please report them via the "Bug Track" link at http://bugzilla.redhat.com/bugzilla/
AUTHOR
Nalin Dahyabhai <nalin@redhat.com>
Red Hat 2000/7/21 pam_localuser(8)
Check Out this Related Man Page
PAM_LOCALUSER(8) Linux-PAM Manual PAM_LOCALUSER(8)NAME
pam_localuser - require users to be listed in /etc/passwd
SYNOPSIS
pam_localuser.so [debug] [file=/path/passwd]
DESCRIPTION
pam_localuser is a PAM module to help implementing site-wide login policies, where they typically include a subset of the network's users
and a few accounts that are local to a particular workstation. Using pam_localuser and pam_wheel or pam_listfile is an effective way to
restrict access to either local users and/or a subset of the network's users.
This could also be implemented using pam_listfile.so and a very short awk script invoked by cron, but it's common enough to have been
separated out.
OPTIONS
debug
Print debug information.
file=/path/passwd
Use a file other than /etc/passwd.
MODULE TYPES PROVIDED
All module types (account, auth, password and session) are provided.
RETURN VALUES
PAM_SUCCESS
The new localuser was set successfully.
PAM_SERVICE_ERR
No username was given.
PAM_USER_UNKNOWN
User not known.
EXAMPLES
Add the following line to /etc/pam.d/su to allow only local users in group wheel to use su.
account sufficient pam_localuser.so
account required pam_wheel.so
FILES
/etc/passwd
Local user account information.
SEE ALSO pam.conf(5), pam.d(5), pam(7)AUTHOR
pam_localuser was written by Nalin Dahyabhai <nalin@redhat.com>.
Linux-PAM Manual 06/04/2011 PAM_LOCALUSER(8)
Hello,
I'm new to Centos and to openldap. I am by trade a Solaris Admin. I'm experimenting with openldap and thought Linux would be easier to install and setup openldap on, so far this is true. The problem I'm having is that I can't get the client server to authenticate to the openldap server. I... (1 Reply)
Hi,
I have a server running RHEL 6.0.
While logging in through root ,I can login.But if I try to login through "integ" user,I am unable to login.
/var/log/secure messages:::
May 20 15:25:23 punsyncserv su: pam_unix(su-l:session): session opened for user integ by root(uid=0)
May 20 15:29:44... (4 Replies)
i've been searching the WEB, and editing my /etc/pam.d/system-auth,passwd-auth,sshd.
but even a thousand wrong logins, my account doesnt lock.
thanks
# cat system-auth-ac
#%PAM-1.0
# This file is auto-generated.
# User changes will be destroyed the next time authconfig is run.
auth ... (2 Replies)
Hi Friends,
I have below scenarios .
dom1.test.com - LDAP
dom2.test.com - AD
Requirement is establish a trust relation between LDAP and AD server in such a way that if any user login on LDAP managed authentication server with
dom1\username -> get authenticated by LDAP host
... (2 Replies)
Hi,
I am unable to enforce password complexity policy for root user. (other users are working) on RHEL 6.2. Anything wrong with system-auth parameters? PLease help..
vi /etc/pam.d/system-auth
#%PAM-1.0
# This file is auto-generated.
# User changes will be destroyed the next time... (1 Reply)
Hello.
I have a RHEL 7.2 where a regular user can't make a "su -" to reach root account:
server532:t711740:/$ id
uid=75456(t711740) gid=10000(personales) groups=10000(personales),10(wheel)
tehrh532:t711740:/$ su -
Password:
su: Permission denied
But can make "sudo su -"... (2 Replies)
I've got a problem with a proxy configuration. We have an LDAP group that lists all users who are authorised to use the proxy to FTP (usually Filezilla) out to the world, and by implication those not in the group should be denied. My users are delighted that this has been enabled and those that... (9 Replies)