summaryrefslogtreecommitdiff
path: root/modules/pam_sepermit/README
blob: 114298324dbad8872b4a30231d97c737b39bd284 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
pam_sepermit — PAM module to allow/deny login depending on SELinux enforcement
state

━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━

DESCRIPTION

The pam_sepermit module allows or denies login depending on SELinux enforcement
state.

When the user which is logging in matches an entry in the config file he is
allowed access only when the SELinux is in enforcing mode. Otherwise he is
denied access. For users not matching any entry in the config file the
pam_sepermit module returns PAM_IGNORE return value.

The config file contains a simple list of user names one per line. If the name
is prefixed with @ character it means that all users in the group name match.
If it is prefixed with a % character the SELinux user is used to match against
the name instead of the account name. Note that when SELinux is disabled the
SELinux user assigned to the account cannot be determined. This means that such
entries are never matched when SELinux is disabled and pam_sepermit will return
PAM_IGNORE.

Each user name in the configuration file can have optional arguments separated
by : character. The only currently recognized argument is exclusive. The
pam_sepermit module will allow only single concurrent user session for the user
with this argument specified and it will attempt to kill all processes of the
user after logout.

OPTIONS

debug

    Turns on debugging via syslog(3).

conf=/path/to/config/file

    Path to alternative config file overriding the default.

EXAMPLES

auth     [success=done ignore=ignore default=bad] pam_sepermit.so
auth     required  pam_unix.so
account  required  pam_unix.so
session  required  pam_permit.so


AUTHOR

pam_sepermit was written by Tomas Mraz <tmraz@redhat.com>.