10 More Discussions You Might Find Interesting
1. SuSE
Hello all,
I recently updated PAM policy files (pam_authz.policy) on HP-UX Servers with AD groups involving allowing and denying the certain groups..
Could anyone tell me what is the equivalent mechanism in SLES(Linux)? Is it possible to allow/deny AD group access with the SLES LDAP... (0 Replies)
Discussion started by: lcclaj0
0 Replies
2. Red Hat
Hello friends
Today i have changed my passwd policy for strong password
Everything is working correctly but when i changed my password , it did not ask me my old password
my /etc/pam.d/system-auth file is (only passwdqc.so module line)
password required pam_passwdqc.so retry=3... (0 Replies)
Discussion started by: rink
0 Replies
3. UNIX for Dummies Questions & Answers
I guess I probably ask a dumb question but why use RADIUS for authentication as there are many ways to do it, as authentication is basically a user/password check?
What is the benifit(s) of using it ?
Thanks! (3 Replies)
Discussion started by: qiulang
3 Replies
4. UNIX for Advanced & Expert Users
I have applied pam authentication for local users as highlighted in below file.
# cat /etc/pam.d/system-auth
#%PAM-1.0
# This file is auto-generated.
# User changes will be destroyed the next time authconfig is run.
auth required pam_env.so
auth sufficient pam_unix.so... (0 Replies)
Discussion started by: pinga123
0 Replies
5. Red Hat
Hi All,
I am configured radius authentication server and PPPoE in my Linux systems. It is not work..
Kindly help me how to configure pppoe server to authenticate the clients via radius it is working in UNIX FreeBSD for the same not working in linux.
Can you have any configuration... (0 Replies)
Discussion started by: thakshina
0 Replies
6. AIX
We want to use RADIUS to authenticate our AIX server logins. Can anybody tell me how to set on AIX server up to use a Radius server to authenticate or point me to documentation on setting up AIX to use Radius to authenticate user login.
Our problem is that we have a few users that access our... (1 Reply)
Discussion started by: daveisme
1 Replies
7. Red Hat
Hello,
I'm now analysing the working of PAM.
PAM works with config-files, that you can find under the directory /etc/pam.d.
One of those config.-files is the file: login.conf.
------------------------------------------------------------------------------------------------------
#... (0 Replies)
Discussion started by: caroline
0 Replies
8. IP Networking
Network Configuration Figure
http://geocities.com/fy_heng/test1.JPG
Dear all,
I currently performing an testing using the above network configuration (Please click on the above link).
On how actually the RADIUS server can authenticate the user who connect to the WAP (wireless access point)... (0 Replies)
Discussion started by: Paris Heng
0 Replies
9. Solaris
quick question about PAM module. Here may pam.conf file. How do I verify that pam modules work correctly? Does it mean when it run cron job, it checks the pam module for authentication? Thanks in advance.
#
passwd auth required pam_passwd_auth.so.1
#
# cron service (explicit... (0 Replies)
Discussion started by: mokkan
0 Replies
10. Solaris
Does anyone know how to create a custom pam module for modifying the login authentication procedure? (1 Reply)
Discussion started by: mhm4
1 Replies
PAM_NOLOGIN(8) BSD System Manager's Manual PAM_NOLOGIN(8)
NAME
pam_nologin -- NoLogin PAM module
SYNOPSIS
[service-name] module-type control-flag pam_nologin [options]
DESCRIPTION
The NoLogin authentication service module for PAM provides functionality for only one PAM category: authentication. In terms of the
module-type parameter, this is the ``auth'' feature. It also provides a null function for session management.
NoLogin Authentication Module
The NoLogin authentication component (pam_sm_authenticate()), always returns success for the superuser, and returns success for all other
users if the file /etc/nologin does not exist. If /etc/nologin does exist, then its contents are echoed to non-superusers before failure is
returned. If a "nologin" capability is specified in login.conf(5), then the file thus specified is used instead. This usually defaults to
/etc/nologin.
The following options may be passed to the authentication module:
debug syslog(3) debugging information at LOG_DEBUG level.
no_warn suppress warning messages to the user. These messages include reasons why the user's authentication attempt was declined.
SEE ALSO
syslog(3), login.conf(5), pam.conf(5), nologin(8), pam(8)
BSD
July 8, 2001 BSD