pam module quesion


 
Thread Tools Search this Thread
Operating Systems Solaris pam module quesion
# 1  
Old 12-24-2007
pam module quesion

quick question about PAM module. Here may pam.conf file. How do I verify that pam modules work correctly? Does it mean when it run cron job, it checks the pam module for authentication? Thanks in advance.

#
passwd auth required pam_passwd_auth.so.1
#
# cron service (explicit because of non-usage of pam_roles.so.1)
#
cron account required pam_projects.so.1
cron account required pam_unix_account.so.1
Login or Register to Ask a Question

Previous Thread | Next Thread

10 More Discussions You Might Find Interesting

1. UNIX for Advanced & Expert Users

Read-only env variable in PAM module

Hi guys, does anybody know how to set/create read-only environment variable inside PAM module? I've written my own pam authentication module and I'd need to pass some information to user application started by user after user has been logged to the system and user should not be allowed to change... (0 Replies)
Discussion started by: gonzales01
0 Replies

2. SuSE

PAM password change failed, pam error 20

Hi, I use a software which can create account on many system or application. One of resource which is managed by this soft his a server SUSE Linux Enterprise Server 10 (x86_64). patch level 3. This application which is an IBM application use ssh to launch command to create account in... (3 Replies)
Discussion started by: scabarrus
3 Replies

3. Red Hat

PAM module pam_passwdqc module

Hello friends Today i have changed my passwd policy for strong password Everything is working correctly but when i changed my password , it did not ask me my old password my /etc/pam.d/system-auth file is (only passwdqc.so module line) password required pam_passwdqc.so retry=3... (0 Replies)
Discussion started by: rink
0 Replies

4. Programming

noob error quesion

Hey, I a newbie in unix programming. I type the following command if ((configfd = open(CONFIGFILE, O_CREAT | O_WRONLY)) == -1) and the result I get from open is -1, which means error. how can I figure out the cause of the error ? (2 Replies)
Discussion started by: mellowcandle
2 Replies

5. Shell Programming and Scripting

I suspect a simple quesion

I bet this is really simple but I can only find silly long solutions. Im trying to read the second word of each line in a file and pipe it out, in Win32 it looks something like: for /F "tokens=2" %%b in (file.txt) do etc.. Sorry for the probably dumbass question! (1 Reply)
Discussion started by: joe19oo.c
1 Replies

6. Solaris

xterm quesion

Can we throw a window from solaris to Linux redhat? (1 Reply)
Discussion started by: mokkan
1 Replies

7. Red Hat

PAM -- module key_init.so

Hello, I'm now analysing the working of PAM. PAM works with config-files, that you can find under the directory /etc/pam.d. One of those config.-files is the file: login.conf. ------------------------------------------------------------------------------------------------------ #... (0 Replies)
Discussion started by: caroline
0 Replies

8. Solaris

Pam Module sending a cannot get password enry after certain period in /var/adm/messag

Pam Module sending a cannot get password enry after certain period in /var/adm/message. pam_login_limit(auth): Cannot get Password entry for user 'dbsnmp' What is dbsnmp? Also if account is locked does pam module checks for this locked account at regular interval and keeps on posting... (2 Replies)
Discussion started by: student2009
2 Replies

9. Solaris

Soalris 10 PAM Radius authentication Module

Hello Group, I'm facing Problem with the configuration of "***pam_radius_auth.so.1***" module to be integrated with Freeradius and Funk Steel Belted Radius. Both this radius servers are able to make "Access-Accept" packet. But the SSH or Telnet client is not able to login to the system with the... (0 Replies)
Discussion started by: ImpeccableCode
0 Replies

10. Solaris

Custom pam module

Does anyone know how to create a custom pam module for modifying the login authentication procedure? (1 Reply)
Discussion started by: mhm4
1 Replies
Login or Register to Ask a Question
pam_sm_authenticate(3)					     Library Functions Manual					    pam_sm_authenticate(3)

NAME
pam_sm_authenticate - Service provider implementation for pam_authenticate SYNOPSIS
[ flag ... ] file ... [ library ... ] DESCRIPTION
In response to a call to pam_authenticate(3), the PAM framework calls from the modules listed in the pam.conf(4) file. The authentication provider supplies the back-end functionality for this interface function. The function, is called to verify the identity of the current user. The user is usually required to enter a password or similar authenti- cation token depending upon the authentication scheme configured within the system. The user in question is specified by a prior call to and is referenced by the authentication handle, pamh. If the user is unknown to the authentication service, the service module should mask this error and continue to prompt the user for a pass- word. It should then return the error, The following flag may be passed in to The authentication service should not generate any messages. The authentication service should return if the user has a null authentication token. The argc argument represents the number of module options passed in from the configuration file pam.conf(4). argv specifies the module options, which are interpreted and processed by the authentication service. Please refer to the specific module manual pages for the vari- ous available options. If any unknown option is passed in, the module should log the error and ignore the option. Before returning, should call and retrieve If it has not been set before (ie. the value is NULL), should set it to the password entered by the user using An authentication module may save the authentication status (success or reason for failure) as state in the authentication handle using This information is intended for use by APPLICATION USAGE
Refer to pam(3) for information on thread-safety of PAM interfaces. NOTES
Modules should not retry the authentication in the event of a failure. Applications handle authentication retries and maintain the retry count. To limit the number of retries, the module can return a error. RETURN VALUES
Upon successful completion, must be returned. In addition, the following values may be returned: Maximum number of authentication attempts exceeded. Authentication failure. Can not access authentication data due to insufficient credentials. Underlying authentication service can not retrieve authentication information. User not known to underlying authentication module. Ignore underlying authentication module regardless of whether the control flag is or SEE ALSO
pam(3), pam_authenticate(3), pam.conf(4), pam_user.conf(4). pam_sm_authenticate(3)