2006-02-05 05:32:33 +03:00
|
|
|
|
.\"-
|
|
|
|
|
.\" Copyright (c) 2005 Dag-Erling Co<43>dan Sm<53>rgrav
|
|
|
|
|
.\" All rights reserved.
|
|
|
|
|
.\"
|
|
|
|
|
.\" Redistribution and use in source and binary forms, with or without
|
|
|
|
|
.\" modification, are permitted provided that the following conditions
|
|
|
|
|
.\" are met:
|
|
|
|
|
.\" 1. Redistributions of source code must retain the above copyright
|
|
|
|
|
.\" notice, this list of conditions and the following disclaimer.
|
|
|
|
|
.\" 2. Redistributions in binary form must reproduce the above copyright
|
|
|
|
|
.\" notice, this list of conditions and the following disclaimer in the
|
|
|
|
|
.\" documentation and/or other materials provided with the distribution.
|
|
|
|
|
.\" 3. The name of the author may not be used to endorse or promote
|
|
|
|
|
.\" products derived from this software without specific prior written
|
|
|
|
|
.\" permission.
|
|
|
|
|
.\"
|
|
|
|
|
.\" THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
|
|
|
|
|
.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
|
|
|
|
.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
|
|
|
|
.\" ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
|
|
|
|
|
.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
|
|
|
|
.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
|
|
|
|
.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
|
|
|
|
.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
|
|
|
|
.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
|
|
|
|
.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
|
|
|
|
.\" SUCH DAMAGE.
|
|
|
|
|
.\"
|
2008-01-27 03:54:36 +03:00
|
|
|
|
.\" $Id: pam.conf.5,v 1.1.1.2 2008/01/27 00:54:57 christos Exp $
|
2006-02-05 05:32:33 +03:00
|
|
|
|
.\"
|
2008-01-27 03:54:36 +03:00
|
|
|
|
.Dd June 16, 2005
|
2006-02-05 05:32:33 +03:00
|
|
|
|
.Dt PAM.CONF 5
|
|
|
|
|
.Os
|
|
|
|
|
.Sh NAME
|
|
|
|
|
.Nm pam.conf
|
|
|
|
|
.Nd PAM policy file format
|
|
|
|
|
.Sh DESCRIPTION
|
|
|
|
|
The PAM library searches for policies in the following files, in
|
|
|
|
|
decreasing order of preference:
|
|
|
|
|
.Bl -enum
|
|
|
|
|
.It
|
|
|
|
|
.Pa /etc/pam.d/ Ns Ar service-name
|
|
|
|
|
.It
|
|
|
|
|
.Pa /etc/pam.conf
|
|
|
|
|
.It
|
|
|
|
|
.Pa /usr/local/etc/pam.d/ Ns Ar service-name
|
|
|
|
|
.It
|
|
|
|
|
.Pa /usr/local/etc/pam.conf
|
|
|
|
|
.El
|
|
|
|
|
.Pp
|
|
|
|
|
If none of these locations contains a policy for the given service,
|
|
|
|
|
the
|
|
|
|
|
.Dv default
|
|
|
|
|
policy is used instead, if it exists.
|
|
|
|
|
.Pp
|
|
|
|
|
Entries in per-service policy files must be of one of the two forms
|
|
|
|
|
below:
|
|
|
|
|
.Bd -unfilled -offset indent
|
2008-01-27 03:54:36 +03:00
|
|
|
|
.Ar function-class control-flag module-path Op Ar arguments ...
|
2006-02-05 05:32:33 +03:00
|
|
|
|
.Ar function-class Cm include Ar other-service-name
|
|
|
|
|
.Ed
|
|
|
|
|
.Pp
|
|
|
|
|
Entries in
|
|
|
|
|
.Pa pam.conf Ns -style
|
|
|
|
|
policy files are of the same form, but are prefixed by an additional
|
|
|
|
|
field specifying the name of the service they apply to.
|
|
|
|
|
.Pp
|
|
|
|
|
In both types of policy files, blank lines are ignored, as is anything
|
2008-01-27 03:54:36 +03:00
|
|
|
|
to the right of a
|
|
|
|
|
.Ql #
|
|
|
|
|
sign.
|
2006-02-05 05:32:33 +03:00
|
|
|
|
.Pp
|
|
|
|
|
The
|
|
|
|
|
.Ar function-class
|
|
|
|
|
field specifies the class of functions the entry applies to, and is
|
|
|
|
|
one of:
|
2008-01-27 03:54:36 +03:00
|
|
|
|
.Bl -tag -width ".Cm password"
|
2006-02-05 05:32:33 +03:00
|
|
|
|
.It Cm auth
|
|
|
|
|
Authentication functions
|
|
|
|
|
.Po
|
|
|
|
|
.Xr pam_authenticate 3 ,
|
|
|
|
|
.Xr pam_setcred 3
|
|
|
|
|
.Pc
|
|
|
|
|
.It Cm account
|
|
|
|
|
Account management functions
|
|
|
|
|
.Pq Xr pam_acct_mgmt 3
|
|
|
|
|
.It Cm session
|
|
|
|
|
Session handling functions
|
|
|
|
|
.Po
|
|
|
|
|
.Xr pam_open_session 3 ,
|
|
|
|
|
.Xr pam_close_session 3
|
|
|
|
|
.Pc
|
|
|
|
|
.It Cm password
|
|
|
|
|
Password management functions
|
|
|
|
|
.Pq Xr pam_chauthtok 3
|
|
|
|
|
.El
|
|
|
|
|
.Pp
|
|
|
|
|
The
|
|
|
|
|
.Ar control-flag
|
|
|
|
|
field determines how the result returned by the module affects the
|
|
|
|
|
flow of control through (and the final result of) the rest of the
|
|
|
|
|
chain, and is one of:
|
2008-01-27 03:54:36 +03:00
|
|
|
|
.Bl -tag -width ".Cm sufficient"
|
2006-02-05 05:32:33 +03:00
|
|
|
|
.It Cm required
|
|
|
|
|
If this module succeeds, the result of the chain will be success
|
|
|
|
|
unless a later module fails.
|
|
|
|
|
If it fails, the rest of the chain still runs, but the final result
|
|
|
|
|
will be failure regardless of the success of later modules.
|
|
|
|
|
.It Cm requisite
|
|
|
|
|
If this module succeeds, the result of the chain will be success
|
|
|
|
|
unless a later module fails.
|
|
|
|
|
If it module fails, the chain is broken and the result is failure.
|
|
|
|
|
.It Cm sufficient
|
|
|
|
|
If this module succeeds, the chain is broken and the result is
|
|
|
|
|
success.
|
|
|
|
|
If it fails, the rest of the chain still runs, but the final result
|
|
|
|
|
will be failure unless a later module succeeds.
|
|
|
|
|
.It Cm binding
|
|
|
|
|
If this module succeeds, the chain is broken and the result is
|
|
|
|
|
success.
|
|
|
|
|
If it fails, the rest of the chain still runs, but the final result
|
|
|
|
|
will be failure regardless of the success of later modules.
|
|
|
|
|
.It Cm optional
|
|
|
|
|
If this module succeeds, the result of the chain will be success
|
|
|
|
|
unless a later module fails.
|
|
|
|
|
If this module fails, the result of the chain will be failure unless a
|
|
|
|
|
later module succeeds.
|
|
|
|
|
.El
|
|
|
|
|
.Pp
|
|
|
|
|
There are two exceptions to the above:
|
|
|
|
|
.Cm sufficient
|
|
|
|
|
and
|
|
|
|
|
.Cm binding
|
|
|
|
|
modules are treated as
|
|
|
|
|
.Cm optional
|
|
|
|
|
by
|
|
|
|
|
.Xr pam_setcred 3 ,
|
|
|
|
|
and in the
|
|
|
|
|
.Dv PAM_PRELIM_CHECK
|
|
|
|
|
phase of
|
|
|
|
|
.Xr pam_chauthtok 3 .
|
|
|
|
|
.Pp
|
|
|
|
|
The
|
|
|
|
|
.Ar module-path
|
|
|
|
|
field specifies the name, or optionally the full path, of the module
|
|
|
|
|
to call.
|
|
|
|
|
.Pp
|
|
|
|
|
The remaining fields are passed as arguments to the module if and when
|
|
|
|
|
it is invoked.
|
|
|
|
|
.Pp
|
|
|
|
|
The
|
|
|
|
|
.Cm include
|
|
|
|
|
form of entry causes entries from a different chain (specified by
|
|
|
|
|
.Ar other-system-name )
|
|
|
|
|
to be included in the current one.
|
|
|
|
|
This allows one to define system-wide policies which are then included
|
|
|
|
|
into service-specific policies.
|
|
|
|
|
The system-wide policy can then be modified without having to also
|
|
|
|
|
modify each and every service-specific policy.
|
|
|
|
|
.Sh SEE ALSO
|
|
|
|
|
.Xr pam 3
|
|
|
|
|
.Sh STANDARDS
|
|
|
|
|
.Rs
|
|
|
|
|
.%T "X/Open Single Sign-On Service (XSSO) - Pluggable Authentication Modules"
|
|
|
|
|
.%D "June 1997"
|
|
|
|
|
.Re
|
|
|
|
|
.Sh AUTHORS
|
2008-01-27 03:54:36 +03:00
|
|
|
|
The OpenPAM library was developed for the
|
|
|
|
|
.Fx
|
|
|
|
|
Project by ThinkSec
|
2006-02-05 05:32:33 +03:00
|
|
|
|
AS and Network Associates Laboratories, the Security Research Division
|
2008-01-27 03:54:36 +03:00
|
|
|
|
of Network Associates, Inc.\& under DARPA/SPAWAR contract
|
2006-02-05 05:32:33 +03:00
|
|
|
|
N66001-01-C-8035
|
|
|
|
|
.Pq Dq CBOSS ,
|
|
|
|
|
as part of the DARPA CHATS research program.
|
|
|
|
|
.Pp
|
|
|
|
|
This manual page was written by
|
|
|
|
|
.An Dag-Erling Sm\(/orgrav Aq des@FreeBSD.org .
|