Add a pam(8) manual page that gives a brief introduction as to what PAM
is. The gritty details will be in pam.conf(5).
This commit is contained in:
parent
7bceae4b09
commit
d97108988d
|
@ -1,4 +1,4 @@
|
||||||
# $NetBSD: mi,v 1.764 2005/02/27 21:01:59 thorpej Exp $
|
# $NetBSD: mi,v 1.765 2005/03/02 02:56:24 thorpej Exp $
|
||||||
./etc/mtree/set.man man-sys-root
|
./etc/mtree/set.man man-sys-root
|
||||||
./usr/share/info/am-utils.info man-amd-info info
|
./usr/share/info/am-utils.info man-amd-info info
|
||||||
./usr/share/info/as.info man-computil-info bfd,info
|
./usr/share/info/as.info man-computil-info bfd,info
|
||||||
|
@ -1948,6 +1948,7 @@
|
||||||
./usr/share/man/cat8/ofppc/makedev.0 man-obsolete obsolete
|
./usr/share/man/cat8/ofppc/makedev.0 man-obsolete obsolete
|
||||||
./usr/share/man/cat8/oqmgr.0 man-postfix-catman postfix,.cat
|
./usr/share/man/cat8/oqmgr.0 man-postfix-catman postfix,.cat
|
||||||
./usr/share/man/cat8/pac.0 man-sysutil-catman .cat
|
./usr/share/man/cat8/pac.0 man-sysutil-catman .cat
|
||||||
|
./usr/share/man/cat8/pam.0 man-sysutil-catman .cat
|
||||||
./usr/share/man/cat8/pam_chroot.0 man-sysutil-catman pam,.cat
|
./usr/share/man/cat8/pam_chroot.0 man-sysutil-catman pam,.cat
|
||||||
./usr/share/man/cat8/pam_deny.0 man-sysutil-catman pam,.cat
|
./usr/share/man/cat8/pam_deny.0 man-sysutil-catman pam,.cat
|
||||||
./usr/share/man/cat8/pam_echo.0 man-sysutil-catman pam,.cat
|
./usr/share/man/cat8/pam_echo.0 man-sysutil-catman pam,.cat
|
||||||
|
@ -4147,6 +4148,7 @@
|
||||||
./usr/share/man/man8/ofppc/makedev.8 man-obsolete obsolete
|
./usr/share/man/man8/ofppc/makedev.8 man-obsolete obsolete
|
||||||
./usr/share/man/man8/oqmgr.8 man-postfix-man postfix,.man
|
./usr/share/man/man8/oqmgr.8 man-postfix-man postfix,.man
|
||||||
./usr/share/man/man8/pac.8 man-sysutil-man .man
|
./usr/share/man/man8/pac.8 man-sysutil-man .man
|
||||||
|
./usr/share/man/man8/pam.8 man-sysutil-man .man
|
||||||
./usr/share/man/man8/pam_chroot.8 man-sysutil-man .man,pam
|
./usr/share/man/man8/pam_chroot.8 man-sysutil-man .man,pam
|
||||||
./usr/share/man/man8/pam_deny.8 man-sysutil-man .man,pam
|
./usr/share/man/man8/pam_deny.8 man-sysutil-man .man,pam
|
||||||
./usr/share/man/man8/pam_echo.8 man-sysutil-man .man,pam
|
./usr/share/man/man8/pam_echo.8 man-sysutil-man .man,pam
|
||||||
|
|
|
@ -1,12 +1,11 @@
|
||||||
# $NetBSD: Makefile,v 1.77 2005/02/26 16:17:42 wiz Exp $
|
# $NetBSD: Makefile,v 1.78 2005/03/02 02:56:25 thorpej Exp $
|
||||||
# @(#)Makefile 8.1 (Berkeley) 6/5/93
|
# @(#)Makefile 8.1 (Berkeley) 6/5/93
|
||||||
|
|
||||||
MAN= MAKEDEV.8 afterboot.8 \
|
MAN= MAKEDEV.8 afterboot.8 \
|
||||||
compat_freebsd.8 compat_hpux.8 compat_ibcs2.8 compat_linux.8 \
|
compat_freebsd.8 compat_hpux.8 compat_ibcs2.8 compat_linux.8 \
|
||||||
compat_netbsd32.8 compat_osf1.8 compat_pecoff.8 compat_sunos.8 \
|
compat_netbsd32.8 compat_osf1.8 compat_pecoff.8 compat_sunos.8 \
|
||||||
compat_svr4.8 compat_ultrix.8 diskless.8 genassym.sh.8 hpcboot.8 \
|
compat_svr4.8 compat_ultrix.8 diskless.8 genassym.sh.8 hpcboot.8 \
|
||||||
intro.8 nis.8 \
|
intro.8 nis.8 pam.8 rc.8 rc.subr.8 wizd.8
|
||||||
rc.8 rc.subr.8 wizd.8
|
|
||||||
MLINKS+=MAKEDEV.8 makedev.8
|
MLINKS+=MAKEDEV.8 makedev.8
|
||||||
MLINKS+=compat_svr4.8 compat_sco.8
|
MLINKS+=compat_svr4.8 compat_sco.8
|
||||||
MLINKS+=compat_svr4.8 compat_solaris.8
|
MLINKS+=compat_svr4.8 compat_solaris.8
|
||||||
|
|
|
@ -0,0 +1,117 @@
|
||||||
|
.\" $NetBSD: pam.8,v 1.1 2005/03/02 02:56:25 thorpej Exp $
|
||||||
|
.\"
|
||||||
|
.\" Copyright (c) 2005 The NetBSD Foundation, Inc.
|
||||||
|
.\" All rights reserved.
|
||||||
|
.\"
|
||||||
|
.\" This code is derived from software contributed to The NetBSD Foundation
|
||||||
|
.\" by Jason R. Thorpe.
|
||||||
|
.\"
|
||||||
|
.\" Redistribution and use in source and binary forms, with or without
|
||||||
|
.\" modification, are permitted provided that the following conditions
|
||||||
|
.\" are met:
|
||||||
|
.\" 1. Redistributions of source code must retain the above copyright
|
||||||
|
.\" notice, this list of conditions and the following disclaimer.
|
||||||
|
.\" 2. Redistributions in binary form must reproduce the above copyright
|
||||||
|
.\" notice, this list of conditions and the following disclaimer in the
|
||||||
|
.\" documentation and/or other materials provided with the distribution.
|
||||||
|
.\" 3. All advertising materials mentioning features or use of this software
|
||||||
|
.\" must display the following acknowledgement:
|
||||||
|
.\" This product includes software developed by the NetBSD
|
||||||
|
.\" Foundation, Inc. and its contributors.
|
||||||
|
.\" 4. Neither the name of The NetBSD Foundation nor the names of its
|
||||||
|
.\" contributors may be used to endorse or promote products derived
|
||||||
|
.\" from this software without specific prior written permission.
|
||||||
|
.\"
|
||||||
|
.\" THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
|
||||||
|
.\" ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
|
||||||
|
.\" TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
|
||||||
|
.\" PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
|
||||||
|
.\" BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
|
||||||
|
.\" CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
|
||||||
|
.\" SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
|
||||||
|
.\" INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
|
||||||
|
.\" CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
|
||||||
|
.\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
|
||||||
|
.\" POSSIBILITY OF SUCH DAMAGE.
|
||||||
|
.\"
|
||||||
|
.Dd February 28, 2005
|
||||||
|
.Dt PAM 8
|
||||||
|
.Os
|
||||||
|
.Sh NAME
|
||||||
|
.Nm pam
|
||||||
|
.Nd Pluggable Authentication Modules framework
|
||||||
|
.Sh DESCRIPTION
|
||||||
|
The Pluggable Authentication Modules
|
||||||
|
.Pq PAM
|
||||||
|
framework is a system of libraries that perform authentication tasks for
|
||||||
|
services and applications.
|
||||||
|
Applications that use the PAM API may have their authentication behavior
|
||||||
|
configured by the system administrator though the use of the service's
|
||||||
|
PAM configuration file.
|
||||||
|
.Pp
|
||||||
|
PAM modules provide four classes of functionality:
|
||||||
|
.Bl -tag -width password
|
||||||
|
.It account
|
||||||
|
Account verification services such as password expiration and access control.
|
||||||
|
.It auth
|
||||||
|
Authentication services.
|
||||||
|
This usually takes the form of a challenge-response conversation.
|
||||||
|
However, PAM can also support, with appropriate hardware support, biometric
|
||||||
|
devices, smart-cards, and so forth.
|
||||||
|
.It password
|
||||||
|
Password
|
||||||
|
.Pq or, more generally, authentication token
|
||||||
|
change and update services.
|
||||||
|
.It session
|
||||||
|
Session management services.
|
||||||
|
These are tasks that are performed before access to a service is granted
|
||||||
|
and after access to a service is withdrawn.
|
||||||
|
These may include updating activity logs or setting up and tearing down
|
||||||
|
credential forwarding agents.
|
||||||
|
.El
|
||||||
|
.Pp
|
||||||
|
A primary feature of PAM is the notion of
|
||||||
|
.Dq stacking
|
||||||
|
different modules together to form a processing chain for the task.
|
||||||
|
This allows fairly precise control over how a particular authentication
|
||||||
|
task is performed, and under what conditions.
|
||||||
|
PAM module configurations may also inhereit stacks from other module
|
||||||
|
configurations, providing some degree of centralized administration.
|
||||||
|
.Sh SEE ALSO
|
||||||
|
.Xr login 1 ,
|
||||||
|
.Xr passwd 1 ,
|
||||||
|
.Xr su 1 ,
|
||||||
|
.Xr pam 3 ,
|
||||||
|
.Xr pam.conf 5 ,
|
||||||
|
.Xr pam_chroot 8 ,
|
||||||
|
.Xr pam_deny 8 ,
|
||||||
|
.Xr pam_echo 8 ,
|
||||||
|
.Xr pam_exec 8 ,
|
||||||
|
.Xr pam_ftpusers 8 ,
|
||||||
|
.Xr pam_group 8 ,
|
||||||
|
.Xr pam_guest 8 ,
|
||||||
|
.Xr pam_krb5 8 ,
|
||||||
|
.Xr pam_ksu 8 ,
|
||||||
|
.Xr pam_lastlog 8 ,
|
||||||
|
.Xr pam_login_access 8 ,
|
||||||
|
.Xr pam_nologin 8 ,
|
||||||
|
.Xr pam_permit 8 ,
|
||||||
|
.Xr pam_radius 8 ,
|
||||||
|
.Xr pam_rhosts 8 ,
|
||||||
|
.Xr pam_rootok 8 ,
|
||||||
|
.Xr pam_securetty 8 ,
|
||||||
|
.Xr pam_self 8 ,
|
||||||
|
.Xr pam_skey 8 ,
|
||||||
|
.Xr pam_ssh 8 ,
|
||||||
|
.Xr pam_unix 8
|
||||||
|
.Sh HISTORY
|
||||||
|
The Pluggable Authentication Module framework was originally developed
|
||||||
|
by SunSoft, described in DCE/OSF-RFC 86.0, and first deployed in Solaris 2.6.
|
||||||
|
It was later incorporated into the X/Open Single Sign-On Service
|
||||||
|
.Pq XSSO
|
||||||
|
Pluggable Authentication Modules specifiation.
|
||||||
|
.Pp
|
||||||
|
The Pluggable Authentication Module framework first appeared in
|
||||||
|
.Nx
|
||||||
|
in
|
||||||
|
.Nx 3.0 .
|
Loading…
Reference in New Issue