10 More Discussions You Might Find Interesting
1. UNIX for Advanced & Expert Users
Hi guys, does anybody know how to set/create read-only environment variable inside PAM module? I've written my own pam authentication module and I'd need to pass some information to user application started by user after user has been logged to the system and user should not be allowed to change... (0 Replies)
Discussion started by: gonzales01
0 Replies
2. SuSE
Hi,
I use a software which can create account on many system or application.
One of resource which is managed by this soft his a server SUSE Linux Enterprise Server 10 (x86_64). patch level 3.
This application which is an IBM application use ssh to launch command to create account in... (3 Replies)
Discussion started by: scabarrus
3 Replies
3. Red Hat
Hello friends
Today i have changed my passwd policy for strong password
Everything is working correctly but when i changed my password , it did not ask me my old password
my /etc/pam.d/system-auth file is (only passwdqc.so module line)
password required pam_passwdqc.so retry=3... (0 Replies)
Discussion started by: rink
0 Replies
4. Programming
Hey, I a newbie in unix programming.
I type the following command
if ((configfd = open(CONFIGFILE, O_CREAT | O_WRONLY)) == -1)
and the result I get from open is -1, which means error.
how can I figure out the cause of the error ? (2 Replies)
Discussion started by: mellowcandle
2 Replies
5. Shell Programming and Scripting
I bet this is really simple but I can only find silly long solutions.
Im trying to read the second word of each line in a file and pipe it out, in Win32 it looks something like:
for /F "tokens=2" %%b in (file.txt) do etc..
Sorry for the probably dumbass question! (1 Reply)
Discussion started by: joe19oo.c
1 Replies
6. Solaris
Can we throw a window from solaris to Linux redhat? (1 Reply)
Discussion started by: mokkan
1 Replies
7. Red Hat
Hello,
I'm now analysing the working of PAM.
PAM works with config-files, that you can find under the directory /etc/pam.d.
One of those config.-files is the file: login.conf.
------------------------------------------------------------------------------------------------------
#... (0 Replies)
Discussion started by: caroline
0 Replies
8. Solaris
Pam Module sending a cannot get password enry after certain period in /var/adm/message.
pam_login_limit(auth): Cannot get Password entry for user 'dbsnmp'
What is dbsnmp? Also if account is locked does pam module checks for this locked account at regular interval and keeps on posting... (2 Replies)
Discussion started by: student2009
2 Replies
9. Solaris
Hello Group,
I'm facing Problem with the configuration of "***pam_radius_auth.so.1***" module to be integrated with Freeradius and Funk Steel Belted Radius. Both this radius servers are able to make "Access-Accept" packet. But the SSH or Telnet client is not able to login to the system with the... (0 Replies)
Discussion started by: ImpeccableCode
0 Replies
10. Solaris
Does anyone know how to create a custom pam module for modifying the login authentication procedure? (1 Reply)
Discussion started by: mhm4
1 Replies
pam_sm_authenticate(3) Library Functions Manual pam_sm_authenticate(3)
NAME
pam_sm_authenticate - Service provider implementation for pam_authenticate
SYNOPSIS
[ flag ... ] file ... [ library ... ]
DESCRIPTION
In response to a call to pam_authenticate(3), the PAM framework calls from the modules listed in the pam.conf(4) file. The authentication
provider supplies the back-end functionality for this interface function.
The function, is called to verify the identity of the current user. The user is usually required to enter a password or similar authenti-
cation token depending upon the authentication scheme configured within the system. The user in question is specified by a prior call to
and is referenced by the authentication handle, pamh.
If the user is unknown to the authentication service, the service module should mask this error and continue to prompt the user for a pass-
word. It should then return the error,
The following flag may be passed in to
The authentication service should not generate any messages.
The authentication service should return
if the user has a null authentication token.
The argc argument represents the number of module options passed in from the configuration file pam.conf(4). argv specifies the module
options, which are interpreted and processed by the authentication service. Please refer to the specific module manual pages for the vari-
ous available options. If any unknown option is passed in, the module should log the error and ignore the option.
Before returning, should call and retrieve If it has not been set before (ie. the value is NULL), should set it to the password entered by
the user using
An authentication module may save the authentication status (success or reason for failure) as state in the authentication handle using
This information is intended for use by
APPLICATION USAGE
Refer to pam(3) for information on thread-safety of PAM interfaces.
NOTES
Modules should not retry the authentication in the event of a failure. Applications handle authentication retries and maintain the retry
count. To limit the number of retries, the module can return a error.
RETURN VALUES
Upon successful completion, must be returned. In addition, the following values may be returned:
Maximum number of authentication attempts exceeded.
Authentication failure.
Can not access authentication data due to insufficient credentials.
Underlying authentication service can not retrieve authentication information.
User not known to underlying authentication module.
Ignore underlying authentication module regardless of whether the control
flag is or
SEE ALSO
pam(3), pam_authenticate(3), pam.conf(4), pam_user.conf(4).
pam_sm_authenticate(3)