diff options
author | Steve Langasek <steve.langasek@ubuntu.com> | 2019-01-03 17:05:01 -0800 |
---|---|---|
committer | Steve Langasek <steve.langasek@ubuntu.com> | 2019-01-03 17:27:13 -0800 |
commit | 419bd504587ec2bfc9085fe56e7a53433fd1eae6 (patch) | |
tree | d516c2ccae28dbd020cb69f50162f5d32acd7648 /modules/pam_wheel/README | |
parent | c68dce23face9f26b651917b418c7f80931fa7b7 (diff) | |
parent | 9c52e721044e7501c3d4567b36d222dc7326224a (diff) |
merge upstream version 1.0.1
Diffstat (limited to 'modules/pam_wheel/README')
-rw-r--r-- | modules/pam_wheel/README | 61 |
1 files changed, 61 insertions, 0 deletions
diff --git a/modules/pam_wheel/README b/modules/pam_wheel/README new file mode 100644 index 00000000..6a2b21c5 --- /dev/null +++ b/modules/pam_wheel/README @@ -0,0 +1,61 @@ +pam_wheel — Only permit root access to members of group wheel + +━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ + +DESCRIPTION + +The pam_wheel PAM module is used to enforce the so-called wheel group. By +default it permits root access to the system if the applicant user is a member +of the wheel group. If no group with this name exist, the module is using the +group with the group-ID 0. + +OPTIONS + +debug + + Print debug information. + +deny + + Reverse the sense of the auth operation: if the user is trying to get UID 0 + access and is a member of the wheel group (or the group of the group + option), deny access. Conversely, if the user is not in the group, return + PAM_IGNORE (unless trust was also specified, in which case we return + PAM_SUCCESS). + +group=name + + Instead of checking the wheel or GID 0 groups, use the name group to + perform the authentication. + +root_only + + The check for wheel membership is done only. + +trust + + The pam_wheel module will return PAM_SUCCESS instead of PAM_IGNORE if the + user is a member of the wheel group (thus with a little play stacking the + modules the wheel members may be able to su to root without being prompted + for a passwd). + +use_uid + + The check for wheel membership will be done against the current uid instead + of the original one (useful when jumping with su from one account to + another for example). + +EXAMPLES + +The root account gains access by default (rootok), only wheel members can +become root (wheel) but Unix authenticate non-root applicants. + +su auth sufficient pam_rootok.so +su auth required pam_wheel.so +su auth required pam_unix.so + + +AUTHOR + +pam_wheel was written by Cristian Gafton <gafton@redhat.com>. + |