Pluggable Authentication Modules
pam-auth-update
The Syntax of each rule is a space separated collection of tokens, the first three being case-insensitive:
service type control module-path module-arguments
where:
The control include will include an other configuration file. For example, the below configuration will include the configuration /etc/pam.d/password-auth
auth include password-auth
cat /etc/pam.conf
# ---------------------------------------------------------------------------#
# /etc/pam.conf #
# ---------------------------------------------------------------------------#
#
# NOTE
# ----
#
# NOTE: Most program use a file under the /etc/pam.d/ directory to setup their
# PAM service modules. This file is used only if that directory does not exist.
# ---------------------------------------------------------------------------#
# Format:
# serv. module ctrl module [path] ...[args..] #
# name type flag #
# The configuration of omi is generated by the omi installer.
omi auth required pam_env.so
omi auth required pam_unix.so nullok_secure
omi account required pam_unix.so
omi session required pam_limits.so
# End of section generated by the omi installer.
The directory /etc/pam.d/ is filled with PAM Profiles.
Each application is configured to use one or more profile (for instance, sudo, login)
The name of the profile is by default the same than the named service. For example, login contains the configuration profile for the login service.
If the application does not have a profile, the default profile is used generally called other.
Syntax of each file is the same than in the global configuration but without the service as first name.
type control module-path module-arguments
List:
ls -1 /etc/pam.d/
chfn
chpasswd
chsh
common-account
common-auth
common-password
common-session
common-session-noninteractive
cron
login
newusers
other
passwd
polkit-1
runuser
runuser-l
samba
sshd
su
sudo
systemd-user
vmtoolsd
where: