{"id":3403,"date":"2022-12-20T17:02:34","date_gmt":"2022-12-20T20:02:34","guid":{"rendered":"http:\/\/lode.uno\/linux-man\/index.php\/2022\/12\/20\/pam-man8\/"},"modified":"2022-12-20T17:02:34","modified_gmt":"2022-12-20T20:02:34","slug":"pam-man8","status":"publish","type":"post","link":"https:\/\/lode.uno\/linux-man\/2022\/12\/20\/pam-man8\/","title":{"rendered":"PAM (man8)"},"content":{"rendered":"<h1 align=\"center\">PAM<\/h1>\n<p> <a href=\"#NAME\">NAME<\/a><br \/> <a href=\"#DESCRIPTION\">DESCRIPTION<\/a><br \/> <a href=\"#FILES\">FILES<\/a><br \/> <a href=\"#ERRORS\">ERRORS<\/a><br \/> <a href=\"#CONFORMING TO\">CONFORMING TO<\/a><br \/> <a href=\"#SEE ALSO\">SEE ALSO<\/a> <\/p>\n<hr>\n<h2>NAME <a name=\"NAME\"><\/a> <\/h2>\n<p style=\"margin-left:11%; margin-top: 1em\">PAM, pam \u2212 Pluggable Authentication Modules for Linux<\/p>\n<h2>DESCRIPTION <a name=\"DESCRIPTION\"><\/a> <\/h2>\n<p style=\"margin-left:11%; margin-top: 1em\">This manual is intended to offer a quick introduction to <b>Linux\u2212PAM<\/b>. For more information the reader is directed to the <b>Linux\u2212PAM system administrators&#8217; guide<\/b>.<\/p>\n<p style=\"margin-left:11%; margin-top: 1em\"><b>Linux\u2212PAM<\/b> is a system of libraries that handle the authentication tasks of applications (services) on the system. The library provides a stable general interface (Application Programming Interface \u2212 API) that privilege granting programs (such as <b>login<\/b>(1) and <b>su<\/b>(1)) defer to to perform standard authentication tasks.<\/p>\n<p style=\"margin-left:11%; margin-top: 1em\">The principal feature of the PAM approach is that the nature of the authentication is dynamically configurable. In other words, the system administrator is free to choose how individual service\u2212providing applications will authenticate users. This dynamic configuration is set by the contents of the single <b>Linux\u2212PAM<\/b> configuration file \/etc\/pam.conf. Alternatively, the configuration can be set by individual configuration files located in the \/etc\/pam.d\/ directory. The presence of this directory will cause <b>Linux\u2212PAM<\/b> to <i>ignore<\/i>\/etc\/pam.conf.<\/p>\n<p style=\"margin-left:11%; margin-top: 1em\">Vendor\u2212supplied PAM configuration files might be installed in the system directory \/usr\/lib\/pam.d\/ instead of the machine configuration directory \/etc\/pam.d\/. If no machine configuration file is found, the vendor\u2212supplied file is used. All files in \/etc\/pam.d\/ override files with the same name in \/usr\/lib\/pam.d\/.<\/p>\n<p style=\"margin-left:11%; margin-top: 1em\">From the point of view of the system administrator, for whom this manual is provided, it is not of primary importance to understand the internal behavior of the <b>Linux\u2212PAM<\/b> library. The important point to recognize is that the configuration file(s) <i>define<\/i> the connection between applications (<b>services<\/b>) and the pluggable authentication modules (<b>PAM<\/b>s) that perform the actual authentication tasks.<\/p>\n<p style=\"margin-left:11%; margin-top: 1em\"><b>Linux\u2212PAM<\/b> separates the tasks of <i>authentication<\/i> into four independent management groups: <b>account<\/b> management; <b>auth<\/b>entication management; <b>password<\/b> management; and <b>session<\/b> management. (We highlight the abbreviations used for these groups in the configuration file.)<\/p>\n<p style=\"margin-left:11%; margin-top: 1em\">Simply put, these groups take care of different aspects of a typical user&#8217;s request for a restricted service:<\/p>\n<p style=\"margin-left:11%; margin-top: 1em\"><b>account<\/b> \u2212 provide account verification types of service: has the user&#8217;s password expired?; is this user permitted access to the requested service?<\/p>\n<p style=\"margin-left:11%; margin-top: 1em\"><b>auth<\/b>entication \u2212 authenticate a user and set up user credentials. Typically this is via some challenge\u2212response request that the user must satisfy: if you are who you claim to be please enter your password. Not all authentications are of this type, there exist hardware based authentication schemes (such as the use of smart\u2212cards and biometric devices), with suitable modules, these may be substituted seamlessly for more standard approaches to authentication \u2212 such is the flexibility of <b>Linux\u2212PAM<\/b>.<\/p>\n<p style=\"margin-left:11%; margin-top: 1em\"><b>password<\/b> \u2212 this group&#8217;s responsibility is the task of updating authentication mechanisms. Typically, such services are strongly coupled to those of the <b>auth<\/b> group. Some authentication mechanisms lend themselves well to being updated with such a function. Standard UN*X password\u2212based access is the obvious example: please enter a replacement password.<\/p>\n<p style=\"margin-left:11%; margin-top: 1em\"><b>session<\/b> \u2212 this group of tasks cover things that should be done prior to a service being given and after it is withdrawn. Such tasks include the maintenance of audit trails and the mounting of the user&#8217;s home directory. The <b>session<\/b> management group is important as it provides both an opening and closing hook for modules to affect the services available to a user.<\/p>\n<h2>FILES <a name=\"FILES\"><\/a> <\/h2>\n<p style=\"margin-left:11%; margin-top: 1em\">\/etc\/pam.conf<\/p>\n<p style=\"margin-left:17%;\">the configuration file<\/p>\n<p style=\"margin-left:11%; margin-top: 1em\">\/etc\/pam.d<\/p>\n<p style=\"margin-left:17%;\">the <b>Linux\u2212PAM<\/b> configuration directory. Generally, if this directory is present, the \/etc\/pam.conf file is ignored.<\/p>\n<p style=\"margin-left:11%; margin-top: 1em\">\/usr\/lib\/pam.d<\/p>\n<p style=\"margin-left:17%;\">the <b>Linux\u2212PAM<\/b> vendor configuration directory. Files in \/etc\/pam.d override files with the same name in this directory.<\/p>\n<h2>ERRORS <a name=\"ERRORS\"><\/a> <\/h2>\n<p style=\"margin-left:11%; margin-top: 1em\">Typically errors generated by the <b>Linux\u2212PAM<\/b> system of libraries, will be written to <b>syslog<\/b>(3).<\/p>\n<h2>CONFORMING TO <a name=\"CONFORMING TO\"><\/a> <\/h2>\n<p style=\"margin-left:11%; margin-top: 1em\">DCE\u2212RFC 86.0, October 1995. Contains additional features, but remains backwardly compatible with this RFC.<\/p>\n<h2>SEE ALSO <a name=\"SEE ALSO\"><\/a> <\/h2>\n<p style=\"margin-left:11%; margin-top: 1em\"><b>pam<\/b>(3), <b>pam_authenticate<\/b>(3), <b>pam_sm_setcred<\/b>(3), <b>pam_strerror<\/b>(3), <b>PAM<\/b>(8)<\/p>\n<hr>\n","protected":false},"excerpt":{"rendered":"<p>  PAM, pam \u2212 Pluggable Authentication Modules for Linux <\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2],"tags":[5,52,4,531],"class_list":["post-3403","post","type-post","status-publish","format-standard","hentry","category-8-administracion-del-sistema","tag-5","tag-administracion","tag-man8","tag-pam"],"gutentor_comment":0,"_links":{"self":[{"href":"https:\/\/lode.uno\/linux-man\/wp-json\/wp\/v2\/posts\/3403","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lode.uno\/linux-man\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lode.uno\/linux-man\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lode.uno\/linux-man\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/lode.uno\/linux-man\/wp-json\/wp\/v2\/comments?post=3403"}],"version-history":[{"count":0,"href":"https:\/\/lode.uno\/linux-man\/wp-json\/wp\/v2\/posts\/3403\/revisions"}],"wp:attachment":[{"href":"https:\/\/lode.uno\/linux-man\/wp-json\/wp\/v2\/media?parent=3403"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lode.uno\/linux-man\/wp-json\/wp\/v2\/categories?post=3403"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lode.uno\/linux-man\/wp-json\/wp\/v2\/tags?post=3403"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}