5651273104
example for WHEELSU-type su(1).
146 lines
5.2 KiB
Plaintext
146 lines
5.2 KiB
Plaintext
# Configuration file for Pluggable Authentication Modules (PAM).
|
|
#
|
|
# This file controls the authentication methods that login and other
|
|
# utilities use. See pam(8) for a description of its format.
|
|
#
|
|
# $FreeBSD$
|
|
#
|
|
# service-name module-type control-flag module-path arguments
|
|
#
|
|
# module-type:
|
|
# auth: prompt for a password to authenticate that the user is
|
|
# who they say they are, and set any credentials.
|
|
# account: non-authentication based authorization, based on time,
|
|
# resources, etc.
|
|
# session: housekeeping before and/or after login.
|
|
# password: update authentication tokens.
|
|
#
|
|
# control-flag: How libpam handles success or failure of the module.
|
|
# required: success is required, and on failure all remaining
|
|
# modules are run.
|
|
# requisite: success is required, and on failure no remaining
|
|
# modules are run.
|
|
# sufficient: success is sufficient, and if no previous required
|
|
# module failed, no remaining modules are run.
|
|
# optional: ignored unless the other modules return PAM_IGNORE.
|
|
#
|
|
# arguments:
|
|
# Passed to the module; module-specific plus some generic ones:
|
|
# debug: syslog debug info.
|
|
# no_warn: return no warning messages to the application.
|
|
# use_first_pass: try authentication using password from the
|
|
# preceding auth module.
|
|
# try_first_pass: first try authentication using password from
|
|
# the preceding auth module, and if that fails
|
|
# prompt for a new password.
|
|
# use_mapped_pass: convert cleartext password to a crypto key.
|
|
# expose_account: allow printing more info about the user when
|
|
# prompting.
|
|
#
|
|
# Each final entry must say "required" -- otherwise, things don't
|
|
# work quite right. If you delete a final entry, be sure to change
|
|
# "sufficient" to "required" in the entry before it.
|
|
|
|
login auth required pam_nologin.so
|
|
#login auth sufficient pam_kerberosIV.so
|
|
#login auth sufficient pam_krb5.so
|
|
login auth required pam_unix.so try_first_pass
|
|
#login account required pam_kerberosIV.so
|
|
#login account required pam_krb5.so
|
|
login account required pam_unix.so
|
|
#login session required pam_kerberosIV.so
|
|
#login session required pam_krb5.so
|
|
login password required pam_permit.so
|
|
login session required pam_permit.so
|
|
|
|
rsh auth required pam_nologin.so
|
|
rsh auth required pam_permit.so
|
|
rsh account required pam_unix.so
|
|
rsh session required pam_permit.so
|
|
|
|
# "Standard" su(1) policy.
|
|
#su auth sufficient pam_kerberosIV.so
|
|
#su auth sufficient pam_krb5.so
|
|
su auth sufficient pam_rootok.so
|
|
su auth requisite pam_wheel.so
|
|
su auth required pam_unix.so try_first_pass
|
|
#su account required pam_kerberosIV.so
|
|
#su account required pam_krb5.so
|
|
su account required pam_unix.so
|
|
#su session required pam_kerberosIV.so
|
|
#su session required pam_krb5.so
|
|
su password required pam_permit.so
|
|
su session required pam_permit.so
|
|
|
|
# If you want a "WHEELSU"-type su(1), then comment out the
|
|
# above, and uncomment the below "su" entries.
|
|
##su auth sufficient pam_kerberosIV.so
|
|
##su auth sufficient pam_krb5.so
|
|
#su auth sufficient pam_rootok.so
|
|
#su auth required pam_unix.so try_first_pass auth_as_self
|
|
##su account required pam_kerberosIV.so
|
|
##su account required pam_krb5.so
|
|
#su account required pam_unix.so
|
|
##su session required pam_kerberosIV.so
|
|
##su session required pam_krb5.so
|
|
#su password required pam_permit.so
|
|
#su session required pam_permit.so
|
|
|
|
# Native ftpd.
|
|
ftpd auth required pam_nologin.so
|
|
#ftpd auth sufficient pam_kerberosIV.so
|
|
#ftpd auth sufficient pam_krb5.so
|
|
ftpd auth required pam_unix.so try_first_pass
|
|
#ftpd account required pam_kerberosIV.so
|
|
#ftpd account required pam_krb5.so
|
|
ftpd account required pam_unix.so
|
|
#ftpd session required pam_kerberosIV.so
|
|
#ftpd session required pam_krb5.so
|
|
|
|
# PROftpd.
|
|
ftp auth required pam_nologin.so
|
|
#ftp auth sufficient pam_kerberosIV.so
|
|
#ftp auth sufficient pam_krb5.so
|
|
ftp auth required pam_unix.so try_first_pass
|
|
#ftp account required pam_kerberosIV.so
|
|
#ftp account required pam_krb5.so
|
|
ftp session required pam_unix.so
|
|
#ftp session required pam_kerberosIV.so
|
|
#ftp session required pam_krb5.so
|
|
|
|
# OpenSSH
|
|
sshd auth required pam_nologin.so
|
|
sshd auth required pam_unix.so try_first_pass
|
|
sshd account required pam_unix.so
|
|
sshd password required pam_permit.so
|
|
sshd session required pam_permit.so
|
|
# "csshd" is for challenge-based authentication with sshd (TIS auth, etc.)
|
|
csshd auth required pam_opie.so
|
|
|
|
# SRA telnet. Non-SRA telnet uses 'login'.
|
|
telnetd auth required pam_nologin.so
|
|
telnetd auth required pam_unix.so try_first_pass
|
|
telnetd account required pam_unix.so
|
|
|
|
# Don't break startx
|
|
xserver auth required pam_permit.so
|
|
|
|
# XDM is difficult; it fails or moans unless there are modules for each
|
|
# of the four management groups; auth, account, session and password.
|
|
xdm auth required pam_nologin.so
|
|
xdm auth required pam_unix.so
|
|
xdm account required pam_unix.so
|
|
xdm session required pam_deny.so
|
|
xdm password required pam_deny.so
|
|
|
|
# Mail services
|
|
#imap auth required pam_nologin.so
|
|
#imap auth required pam_unix.so try_first_pass
|
|
#pop3 auth required pam_nologin.so
|
|
#pop3 auth required pam_unix.so try_first_pass
|
|
|
|
# If we don't match anything else, default to using getpwnam().
|
|
other auth required pam_nologin.so
|
|
other auth required pam_unix.so try_first_pass
|
|
other account required pam_unix.so
|