PAM_MAKE(8) Reference Manual PAM_MAKE(8)NAME
pam_make - PAM module which calls make
SYNOPSIS
pam_make.so [debug] [nosetuid] [make=prog] [log=file] /path/ [...]
DESCRIPTION
pam_make is a PAM module that can be used to run make in a given directory.
OPTIONS
debug
Print debug information.
log=file
The output of make is appended to file
nosetuid
Per default pam_make.so will execute make with the effective user ID of the calling process. Specifying this option means make is run
with the real user ID.
make=prog
The command prog is used instead of make.
MODULE SERVICES PROVIDED
The services auth, account, password and session are supported.
RETURN VALUES
PAM_SUCCESS
The make command runs successfull.
PAM_SERVICE_ERR
No argument or a wrong number of arguments were given.
PAM_SYSTEM_ERR
A system error occured or the make command failed.
PAM_IGNORE
pam_setcred was called, which does not execute the make command.
EXAMPLES
Add the following line to /etc/pam.d/passwd to rebuild the NIS database after each local password change:
passwd optional pam_make.so /var/yp
This will execute the command:
make -C /var/yp
HISTORY
The first implementation of pam_make was written by Mihai Ibanescu <misa@dntis.ro>.
SEE ALSO pam.conf(5), pam.d(8), pam(8)AUTHOR
pam_make was written by Thorsten Kukuk <kukuk@thkukuk.de>.
Reference Manual 10/25/2006 PAM_MAKE(8)
Check Out this Related Man Page
pam_unix2(8) Reference Manual pam_unix2(8)NAME
pam_unix2 - Standard PAM module for traditional password authentication
DESCRIPTION
The pam_unix2 PAM module is for traditional password authentication. It uses standard calls from the glibc NSS libraries to retrieve and
set account information as well as authentication. Usually this is obtained from the the local files /etc/passwd and /etc/shadow or from a
NIS map.
The options can be added in the PAM configuration files for every single service. /etc/default/passwd defines, which password encryption
algorithm should be used in case of a password change.
OPTIONS
The following options may be passed to all types of management groups except session:
debug A lot of debug informations are printed with syslog(3).
nullok Normally the account is disabled if no password is set or if the length of the password is zero. With this option the user is
allowed to change the password for such accounts. This option does not overwrite a hardcoded default by the calling process.
use_first_pass
The default is, that pam_unix2 tries to get the authentication token from a previous module. If no token is available, the user is
asked for the old password. With this option, pam_unix2 aborts with an error if no authentication token from a previous module is
available.
The following additional options may be passed to the passwd rules of this modules:
nisdir=<path>
This options specifies a path to the source files for NIS maps on a NIS master server. If this option is given, the passwords of NIS
accounts will not be changed with yppasswd(1), instead the local passwd and shadow files below <path> will be modified. In conjunc-
tion with rpasswdd(8) and pam_make rpc.yppasswdd(8) can be replaced with a more secure solution on the NIS master server.
use_authtok
Set the new password to the one provided by the previously stacked password module. If this option is not set, pam_unix2 would ask
the user for the new password.
One of the following options may be passed to the session rules of this modules:
debug Some messages (login time, logout time) are logged to syslog with priority LOG_DEBUG.
trace Some messages (login time, logout time) are logged to syslog with priority LOG_NOTICE.
none No messages are logged. This is the default.
The acct management does not recognize any additional options. For root, password and login expire are ignored, only on aging warning is
printed. If no shadow information exists, it always returns success.
FILES
/etc/default/passwd
SEE ALSO login(1), passwd(1), pam.conf(8), pam.d(8), pam_pwcheck(8), pam(8), rpasswd(1), rpasswdd(8), rpc.yppasswdd(8), yppasswd(1)pam_unix2 August 2006 pam_unix2(8)