Content-type: text/html
Man page of PAM_LOGINUID
PAM_LOGINUID
Section: Linux-PAM Manual (8)
Updated: 07/27/2008
Index
Return to Main Contents
NAME
pam_loginuid - Record user's login uid to the process attribute
SYNOPSIS
-
pam_loginuid.so [require_auditd]
DESCRIPTION
The pam_loginuid module sets the loginuid process attribute for the process that was authenticated. This is necessary for applications to be correctly audited. This PAM module should only be used for entry point applications like: login, sshd, gdm, vsftpd, crond and atd. There are probably other entry point applications besides these. You should not use it for applications like sudo or su as that defeats the purpose by changing the loginuid to the account they just switched to.
OPTIONS
require_auditd
-
This option, when given, will cause this module to query the audit daemon status and deny logins if it is not running.
MODULE SERVICES PROVIDED
The
session
service is supported.
RETURN VALUES
PAM_SESSION_ERR
-
An error occured during session management.
EXAMPLES
-
#%PAM-1.0
auth required pam_unix.so
auth required pam_nologin.so
account required pam_unix.so
password required pam_unix.so
session required pam_unix.so
session required pam_loginuid.so
SEE ALSO
pam.conf(5),
pam.d(5),
pam(7),
auditctl(8),
auditd(8)
AUTHOR
pam_loginuid was written by Steve Grubb <sgrubb@redhat.com>
Index
- NAME
-
- SYNOPSIS
-
- DESCRIPTION
-
- OPTIONS
-
- MODULE SERVICES PROVIDED
-
- RETURN VALUES
-
- EXAMPLES
-
- SEE ALSO
-
- AUTHOR
-
This document was created by
man2html,
using the manual pages.
Time: 04:17:50 GMT, September 24, 2010