path: root/modules/pam_loginuid/pam_loginuid.8
diff options
Diffstat (limited to 'modules/pam_loginuid/pam_loginuid.8')
1 files changed, 59 insertions, 0 deletions
diff --git a/modules/pam_loginuid/pam_loginuid.8 b/modules/pam_loginuid/pam_loginuid.8
new file mode 100644
index 00000000..55485e9d
--- /dev/null
+++ b/modules/pam_loginuid/pam_loginuid.8
@@ -0,0 +1,59 @@
+.\" Title: pam_loginuid
+.\" Author:
+.\" Generator: DocBook XSL Stylesheets vsnapshot_2006\-08\-24_0226 <>
+.\" Date: 08/29/2006
+.\" Manual: Linux\-PAM Manual
+.\" Source: Linux\-PAM Manual
+.TH "PAM_LOGINUID" "8" "08/29/2006" "Linux\-PAM Manual" "Linux\-PAM Manual"
+.\" disable hyphenation
+.\" disable justification (adjust text to left margin only) l
+pam_loginuid \- Record user's login uid to the process attribute
+.HP 16
+\\fR [require_auditd]
+The pam_loginuid module sets the loginuid process attribute for the process that was authenticated. This is necessary for applications to be correctly audited. This PAM module should only be used for entry point applications like: login, sshd, gdm, vsftpd, crond, at, and remote. There are probably other entry point applications besides these. You should not use it for applications like sudo or su as that defeats the purpose by changing the loginuid to the account they just switched to.
+.TP 3n
+This option, when given, will cause this module to query the audit daemon status and deny logins if it is not running.
+service is supported.
+.TP 3n
+An error occured during session management.
+.RS 3n
+auth required
+auth required
+account required
+password required
+session required
+session required
+pam_loginuid was written by Steve Grubb <>