Rechercher une page de manuel
pam_loginuid
Langue: en
Version: 184461 (CentOS - 06/07/09)
Section: 8 (Commandes administrateur)
NAME
pam_loginuid - record user's login uid to the process attributeSYNOPSIS
session required /lib/security/pam_loginuid.soDESCRIPTION
pam_loginuid sets the loginuid process attribute for the process that was authenticated. This is necessary for applications to be correctly audited. This pam module should only be used for entry point applications like: login, sshd, gdm, vsftpd, crond, at, and remote. There are probably other entry point applications besides these. You should not use it for applications like sudo or su as that defeats the purpose by changing the loginuid to the account they just switched to.ARGUMENTS
- require_auditd
- This option, when given, will cause this module to query the audit daemon status and deny logins if it is not running.
EXAMPLE
/etc/pam.d/gdm:auth required pam_stack.so service=system-auth
auth required pam_nologin.so
account required pam_stack.so service=system-auth
password required pam_stack.so service=system-auth
session required pam_stack.so service=system-auth
session required pam_loginuid.so
session optional pam_console.so
SEE ALSO
auditd(8), auditctl(8)BUGS
Let's hope not, but if you find any, please email the author.AUTHOR
Steve Grubb <sgrubb@redhat.com>Contenus ©2006-2024 Benjamin Poulain
Design ©2006-2024 Maxime Vantorre