blob: 9e6c7d020792995a56f7692fd81b5abc4ea77f73 (
plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
|
<refentry xmlns="http://docbook.org/ns/docbook" version="5.0" xml:id="pam_permit">
<refmeta>
<refentrytitle>pam_permit</refentrytitle>
<manvolnum>8</manvolnum>
<refmiscinfo class="source">Linux-PAM</refmiscinfo>
<refmiscinfo class="manual">Linux-PAM Manual</refmiscinfo>
</refmeta>
<refnamediv xml:id="pam_permit-name">
<refname>pam_permit</refname>
<refpurpose>The promiscuous module</refpurpose>
</refnamediv>
<refsynopsisdiv>
<cmdsynopsis xml:id="pam_permit-cmdsynopsis" sepchar=" ">
<command>pam_permit.so</command>
</cmdsynopsis>
</refsynopsisdiv>
<refsect1 xml:id="pam_permit-description">
<title>DESCRIPTION</title>
<para>
pam_permit is a PAM module that always permit access. It does
nothing else.
</para>
<para>
In the case of authentication, the user's name will be set to
<emphasis>nobody</emphasis> if the application didn't set one.
Many applications and PAM modules become confused if this name
is unknown.
</para>
<para>
This module is very dangerous. It should be used with extreme
caution.
</para>
</refsect1>
<refsect1 xml:id="pam_permit-options">
<title>OPTIONS</title>
<para> This module does not recognise any options.</para>
</refsect1>
<refsect1 xml:id="pam_permit-types">
<title>MODULE TYPES PROVIDED</title>
<para>
The <option>auth</option>, <option>account</option>,
<option>password</option> and <option>session</option>
module types are provided.
</para>
</refsect1>
<refsect1 xml:id="pam_permit-return_values">
<title>RETURN VALUES</title>
<variablelist>
<varlistentry>
<term>PAM_SUCCESS</term>
<listitem>
<para>
This module always returns this value.
</para>
</listitem>
</varlistentry>
</variablelist>
</refsect1>
<refsect1 xml:id="pam_permit-examples">
<title>EXAMPLES</title>
<para>
Add this line to your other login entries to disable account
management, but continue to permit users to log in.
<programlisting>
account required pam_permit.so
</programlisting>
</para>
</refsect1>
<refsect1 xml:id="pam_permit-see_also">
<title>SEE ALSO</title>
<para>
<citerefentry>
<refentrytitle>pam.conf</refentrytitle><manvolnum>5</manvolnum>
</citerefentry>,
<citerefentry>
<refentrytitle>pam.d</refentrytitle><manvolnum>5</manvolnum>
</citerefentry>,
<citerefentry>
<refentrytitle>pam</refentrytitle><manvolnum>7</manvolnum>
</citerefentry>
</para>
</refsect1>
<refsect1 xml:id="pam_permit-author">
<title>AUTHOR</title>
<para>
pam_permit was written by Andrew G. Morgan, <morgan@kernel.org>.
</para>
</refsect1>
</refentry>
|