s/Linux-PAM/PAM/g

This commit is contained in:
John Polstra 1998-11-18 01:20:54 +00:00
parent 8999aed3f1
commit 4adeb82df8
8 changed files with 37 additions and 43 deletions

View File

@ -1,10 +1,10 @@
.\" Hey Emacs! This file is -*- nroff -*- source. .\" Hey Emacs! This file is -*- nroff -*- source.
.\" $Id: pam.8,v 1.2 1997/02/15 18:37:27 morgan Exp $ .\" $Id: pam.8,v 1.2 1997/02/15 18:37:27 morgan Exp $
.\" Copyright (c) Andrew G. Morgan 1996-7 <morgan@linux.kernel.org> .\" Copyright (c) Andrew G. Morgan 1996-7 <morgan@linux.kernel.org>
.TH PAM 8 "1997 Feb 9" "Linux-PAM 0.56" "Linux-PAM Manual" .TH PAM 8 "1997 Feb 9" "PAM 0.56" "PAM Manual"
.SH NAME .SH NAME
Linux-PAM \- Pluggable Authentication Modules for Linux PAM \- Pluggable Authentication Modules
.SH SYNOPSIS .SH SYNOPSIS
.B /etc/pam.conf .B /etc/pam.conf
@ -12,12 +12,12 @@ Linux-PAM \- Pluggable Authentication Modules for Linux
.SH DESCRIPTION .SH DESCRIPTION
This manual is intended to offer a quick introduction to This manual is intended to offer a quick introduction to
.BR Linux-PAM ". " .BR PAM ". "
For more information the reader is directed to the For more information the reader is directed to the
.BR "Linux-PAM system administrators' guide". .BR "Linux-PAM system administrators' guide".
.sp .sp
.BR Linux-PAM .BR PAM
Is a system of libraries that handle the authentication tasks of Is a system of libraries that handle the authentication tasks of
applications (services) on the system. The library provides a stable applications (services) on the system. The library provides a stable
general interface (Application Programming Interface - API) that general interface (Application Programming Interface - API) that
@ -33,21 +33,21 @@ authentication is dynamically configurable. In other words, the
system administrator is free to choose how individual system administrator is free to choose how individual
service-providing applications will authenticate users. This dynamic service-providing applications will authenticate users. This dynamic
configuration is set by the contents of the single configuration is set by the contents of the single
.BR Linux-PAM .BR PAM
configuration file configuration file
.BR /etc/pam.conf "." .BR /etc/pam.conf "."
Alternatively, the configuration can be set by individual Alternatively, the configuration can be set by individual
configuration files located in the configuration files located in the
.B /etc/pam.d/ .B /etc/pam.d/
directory. directory.
.IB "The presence of this directory will cause " Linux-PAM " to ignore" .IB "The presence of this directory will cause " PAM " to ignore"
.BI /etc/pam.conf "." .BI /etc/pam.conf "."
.sp .sp
From the point of view of the system administrator, for whom this From the point of view of the system administrator, for whom this
manual is provided, it is not of primary importance to understand the manual is provided, it is not of primary importance to understand the
internal behavior of the internal behavior of the
.BR Linux-PAM .BR PAM
library. The important point to recognize is that the configuration library. The important point to recognize is that the configuration
file(s) file(s)
.I define .I define
@ -58,7 +58,7 @@ and the pluggable authentication modules
that perform the actual authentication tasks. that perform the actual authentication tasks.
.sp .sp
.BR Linux-PAM .BR PAM
separates the tasks of separates the tasks of
.I authentication .I authentication
into four independent management groups: into four independent management groups:
@ -88,7 +88,7 @@ are of this type, there exist hardware based authentication schemes
(such as the use of smart-cards and biometric devices), with suitable (such as the use of smart-cards and biometric devices), with suitable
modules, these may be substituted seamlessly for more standard modules, these may be substituted seamlessly for more standard
approaches to authentication - such is the flexibility of approaches to authentication - such is the flexibility of
.BR Linux-PAM "." .BR PAM "."
.br .br
.BR password " - " .BR password " - "
@ -113,7 +113,7 @@ closing hook for modules to affect the services available to a user.
.SH The configuration file(s) .SH The configuration file(s)
When a When a
.BR Linux-PAM .BR PAM
aware privilege granting application is started, it activates its aware privilege granting application is started, it activates its
attachment to the PAM-API. This activation performs a number of attachment to the PAM-API. This activation performs a number of
tasks, the most important being the reading of the configuration file(s): tasks, the most important being the reading of the configuration file(s):
@ -158,7 +158,7 @@ directory. This filename must be in lower case.
.sp .sp
An important feature of An important feature of
.BR Linux-PAM ", " .BR PAM ", "
is that a number of rules may be is that a number of rules may be
.I stacked .I stacked
to combine the services of a number of PAMs for a given authentication to combine the services of a number of PAMs for a given authentication
@ -237,24 +237,18 @@ documented for each individual module.
.BR /etc/pam.conf " - the configuration file" .BR /etc/pam.conf " - the configuration file"
.br .br
.BR /etc/pam.d/ " - the" .BR /etc/pam.d/ " - the"
.BR Linux-PAM .BR PAM
configuration directory. If this directory is present, the configuration directory. If this directory is present, the
.B /etc/pam.conf .B /etc/pam.conf
file is ignored. file is ignored.
.br .br
.BR /usr/lib/libpam.so.X " - the dynamic library" .BR /usr/lib/libpam.so.X " - the dynamic library"
.br .br
.BR /usr/lib/security/*.so " - the PAMs .BR /usr/lib/pam_*.so " - the PAMs
.sp
Note, to conform to the Linux File-system standard, the libraries and
modules in your system may be located in
.BR /lib " and " /lib/security
respectively.
.SH ERRORS .SH ERRORS
Typically errors generated by the Typically errors generated by the
.BR Linux-PAM .BR PAM
system of libraries, will be written to system of libraries, will be written to
.BR syslog "(3)." .BR syslog "(3)."

View File

@ -1,7 +1,7 @@
.\" Hey Emacs! This file is -*- nroff -*- source. .\" Hey Emacs! This file is -*- nroff -*- source.
.\" $Id: pam_authenticate.3,v 1.2 1997/02/15 18:39:59 morgan Exp $ .\" $Id: pam_authenticate.3,v 1.2 1997/02/15 18:39:59 morgan Exp $
.\" Copyright (c) Andrew G. Morgan 1996-7 <morgan@parc.power.net> .\" Copyright (c) Andrew G. Morgan 1996-7 <morgan@parc.power.net>
.TH PAM_AUTHENTICATE 3 "1996 Dec 9" "Linux-PAM 0.55" "App. Programmers' Manual" .TH PAM_AUTHENTICATE 3 "1996 Dec 9" "PAM 0.55" "App. Programmers' Manual"
.SH NAME .SH NAME
pam_authenticate \- authenticate a user pam_authenticate \- authenticate a user
@ -18,7 +18,7 @@ pam_authenticate \- authenticate a user
Use this function to authenticate an applicant user. It is linked Use this function to authenticate an applicant user. It is linked
.I dynamically .I dynamically
to the authentication modules by to the authentication modules by
.BR Linux-PAM ". " .BR PAM ". "
It is the task of these module to perform such an authentication. The It is the task of these module to perform such an authentication. The
specific nature of the authentication is not the concern of the specific nature of the authentication is not the concern of the
application. application.
@ -27,7 +27,7 @@ application.
Following successful completion, the Following successful completion, the
.BR name .BR name
of the authenticated user will be present in the of the authenticated user will be present in the
.BR Linux-PAM .BR PAM
item item
.BR PAM_USER ". " .BR PAM_USER ". "
This item may be recovered with a call to This item may be recovered with a call to
@ -83,7 +83,7 @@ and
.BR pam_strerror "(3). " .BR pam_strerror "(3). "
Also, see the three Also, see the three
.BR Linux-PAM .BR PAM
Guides, for Guides, for
.BR "System administrators" ", " .BR "System administrators" ", "
.BR "module developers" ", " .BR "module developers" ", "

View File

@ -1,7 +1,7 @@
.\" Hey Emacs! This file is -*- nroff -*- source. .\" Hey Emacs! This file is -*- nroff -*- source.
.\" $Id: pam_chauthtok.3,v 1.2 1997/02/15 18:42:23 morgan Exp $ .\" $Id: pam_chauthtok.3,v 1.2 1997/02/15 18:42:23 morgan Exp $
.\" Copyright (c) Andrew G. Morgan 1997 <morgan@parc.power.net> .\" Copyright (c) Andrew G. Morgan 1997 <morgan@parc.power.net>
.TH PAM_CHAUTHTOK 3 "1997 Jan 4" "Linux-PAM 0.55" "App. Programmers' Manual" .TH PAM_CHAUTHTOK 3 "1997 Jan 4" "PAM 0.55" "App. Programmers' Manual"
.SH NAME .SH NAME
pam_chauthtok \- updating authentication tokens pam_chauthtok \- updating authentication tokens
@ -21,7 +21,7 @@ etc.) of an applicant user.
.br .br
Note, the application should not pre-authenticate the user, as this is Note, the application should not pre-authenticate the user, as this is
performed (if required) by the performed (if required) by the
.BR Linux-PAM .BR PAM
framework. framework.
.br .br
@ -93,7 +93,7 @@ and
.br .br
Also, see the three Also, see the three
.BR Linux-PAM .BR PAM
Guides, for Guides, for
.BR "System administrators" ", " .BR "System administrators" ", "
.BR "module developers" ", " .BR "module developers" ", "

View File

@ -1,7 +1,7 @@
.\" Hey Emacs! This file is -*- nroff -*- source. .\" Hey Emacs! This file is -*- nroff -*- source.
.\" $Id: pam_fail_delay.3,v 1.2 1997/02/15 18:47:46 morgan Exp morgan $ .\" $Id: pam_fail_delay.3,v 1.2 1997/02/15 18:47:46 morgan Exp morgan $
.\" Copyright (c) Andrew G. Morgan 1997 <morgan@parc.power.net> .\" Copyright (c) Andrew G. Morgan 1997 <morgan@parc.power.net>
.TH PAM_FAIL_DELAY 3 "1997 Jan 12" "Linux-PAM 0.56" "Programmers' Manual" .TH PAM_FAIL_DELAY 3 "1997 Jan 12" "PAM 0.56" "Programmers' Manual"
.SH NAME .SH NAME
pam_fail_delay \- request a delay on failure pam_fail_delay \- request a delay on failure
@ -35,7 +35,7 @@ of useful information.
.br .br
To minimize the effectiveness of such attacks, it is desirable to To minimize the effectiveness of such attacks, it is desirable to
introduce a random delay in a failed authentication process. introduce a random delay in a failed authentication process.
.B Linux-PAM .B PAM
provides such a facility. The delay occurs upon failure of the provides such a facility. The delay occurs upon failure of the
.BR pam_authenticate "(3) " .BR pam_authenticate "(3) "
and and

View File

@ -1,7 +1,7 @@
.\" Hey Emacs! This file is -*- nroff -*- source. .\" Hey Emacs! This file is -*- nroff -*- source.
.\" $Id: pam_open_session.3,v 1.2 1997/02/15 18:49:02 morgan Exp $ .\" $Id: pam_open_session.3,v 1.2 1997/02/15 18:49:02 morgan Exp $
.\" Copyright (c) Andrew G. Morgan 1997 <morgan@parc.power.net> .\" Copyright (c) Andrew G. Morgan 1997 <morgan@parc.power.net>
.TH PAM_OPEN_SESSION 3 "1997 Jan 4" "Linux-PAM 0.55" "App. Programmers' Manual" .TH PAM_OPEN_SESSION 3 "1997 Jan 4" "PAM 0.55" "App. Programmers' Manual"
.SH NAME .SH NAME
pam_open/close_session \- PAM session management pam_open/close_session \- PAM session management

View File

@ -1,7 +1,7 @@
.\" Hey Emacs! This file is -*- nroff -*- source. .\" Hey Emacs! This file is -*- nroff -*- source.
.\" $Id: pam_setcred.3,v 1.2 1997/02/15 18:50:49 morgan Exp morgan $ .\" $Id: pam_setcred.3,v 1.1.1.1 1998/07/09 22:10:18 jdp Exp $
.\" Copyright (c) Andrew G. Morgan 1996,1997 <morgan@parc.power.net> .\" Copyright (c) Andrew G. Morgan 1996,1997 <morgan@parc.power.net>
.TH PAM_SETCRED 3 "1997 July 6" "Linux-PAM 0.58" "App. Programmers' Manual" .TH PAM_SETCRED 3 "1997 July 6" "PAM 0.58" "App. Programmers' Manual"
.SH NAME .SH NAME
pam_setcred \- set the credentials for the user pam_setcred \- set the credentials for the user
@ -20,11 +20,11 @@ authenticated and before a session is opened for the user (with
.BR pam_open_session "(3))." .BR pam_open_session "(3))."
It should be noted that credentials come in many forms. Examples It should be noted that credentials come in many forms. Examples
include: group memberships; ticket-files; and Linux-PAM environment include: group memberships; ticket-files; and PAM environment
variables. For this reason, it is important that the basic identity variables. For this reason, it is important that the basic identity
of the user is established, by the application, prior to a call to of the user is established, by the application, prior to a call to
this function. For example, the default this function. For example, the default
.BR Linux-PAM .BR PAM
environment variables should be set and also environment variables should be set and also
.BR initgroups "(2) " .BR initgroups "(2) "
(or equivalent) should have been performed. (or equivalent) should have been performed.

View File

@ -1,10 +1,10 @@
.\" Hey Emacs! This file is -*- nroff -*- source. .\" Hey Emacs! This file is -*- nroff -*- source.
.\" $Id: pam_start.3,v 1.2 1997/02/15 18:51:54 morgan Exp $ .\" $Id: pam_start.3,v 1.2 1997/02/15 18:51:54 morgan Exp $
.\" Copyright (c) Andrew G. Morgan 1996-7 <morgan@parc.power.net> .\" Copyright (c) Andrew G. Morgan 1996-7 <morgan@parc.power.net>
.TH PAM_START 3 "1997 Feb 15" "Linux-PAM 0.56" "Application Programmers' Manual" .TH PAM_START 3 "1997 Feb 15" "PAM 0.56" "Application Programmers' Manual"
.SH NAME .SH NAME
pam_start, pam_end \- activating Linux-PAM pam_start, pam_end \- activating PAM
.SH SYNOPSIS .SH SYNOPSIS
.B #include <security/pam_appl.h> .B #include <security/pam_appl.h>
@ -17,7 +17,7 @@ pam_start, pam_end \- activating Linux-PAM
.TP .TP
.B pam_start .B pam_start
Initialize the Initialize the
.I Linux-PAM .I PAM
library. Identifying the application with a particular library. Identifying the application with a particular
.IR service .IR service
name. The name. The
@ -29,7 +29,7 @@ conversation structure is passed to the library via the
.IR conv .IR conv
argument. (For a complete description of this and other structures argument. (For a complete description of this and other structures
the reader is directed to the more verbose the reader is directed to the more verbose
.IR Linux-PAM .IR PAM
application developers' guide). Upon successful initialization, an application developers' guide). Upon successful initialization, an
opaque pointer-handle for future access to the library is returned opaque pointer-handle for future access to the library is returned
through the contents of the through the contents of the
@ -39,7 +39,7 @@ pointer.
.TP .TP
.B pam_end .B pam_end
Terminate the Terminate the
.B Linux-PAM .B PAM
library. The service application associated with the library. The service application associated with the
.IR pamh .IR pamh
handle, is terminated. The argument, handle, is terminated. The argument,

View File

@ -2,10 +2,10 @@
.\" ripped off from Rick Faith's getgroups man page .\" ripped off from Rick Faith's getgroups man page
.\" $Id: pam_strerror.3,v 1.2 1997/02/15 18:53:04 morgan Exp $ .\" $Id: pam_strerror.3,v 1.2 1997/02/15 18:53:04 morgan Exp $
.\" Copyright (c) Andrew G. Morgan 1996-7 <morgan@parc.power.net> .\" Copyright (c) Andrew G. Morgan 1996-7 <morgan@parc.power.net>
.TH PAM_STRERROR 3 "1997 Feb 15" "Linux-PAM 0.56" "Programmers' Manual" .TH PAM_STRERROR 3 "1997 Feb 15" "PAM 0.56" "Programmers' Manual"
.SH NAME .SH NAME
pam_strerror \- return a textual description of a Linux-PAM error pam_strerror \- return a textual description of a PAM error
.SH SYNOPSIS .SH SYNOPSIS
.B #include <security/pam_appl.h> .B #include <security/pam_appl.h>
@ -20,14 +20,14 @@ or,
.B pam_strerror .B pam_strerror
This function returns a pointer to a line of text describing the This function returns a pointer to a line of text describing the
.BR Linux-PAM .BR PAM
error passed as its sole argument. error passed as its sole argument.
.SH "RETURN VALUE" .SH "RETURN VALUE"
On success this function returns a description of the indicated On success this function returns a description of the indicated
error. Should the function not recognize the error, ``Unknown error. Should the function not recognize the error, ``Unknown
Linux-PAM error'' is returned. PAM error'' is returned.
.SH "CONFORMING TO" .SH "CONFORMING TO"
DCE-RFC 86.0, October 1995. DCE-RFC 86.0, October 1995.