84
Authentication
The Linux-PAM library interprets these keywords in the following manner:
Module-type (cont.)
•
Account
- This module performs non-authentication-based
account management. It is typically used to restrict or permit
access to a service based on the time of day, currently available
system resources (maximum number of users) or perhaps the
location of the applicant user—‘root’ login only on the console.
•
Session
- Primarily, this module is associated with doing things
that need to be done for the user before or after they can be given
service. Such things include the logging of information concerning
the opening or closing of some data exchange with a user,
mounting directories, etc.
•
Password
- This last module type is required for updating the
authentication token associated with the user. Typically, there is
one module for each ‘challenge/response’ based authentication
(auth) module-type.
Control-flag
The control-flag is used to indicate how the PAM library will react to the
success or failure of the module it is associated with. Since modules can
be stacked (modules of the same type execute in series, one after
another), the control-flags determine the relative importance of each
module. The application is not made aware of the individual success or
failure of modules listed in the ‘
/etc/pam.d/
directory. Instead, it receives
a summary of success or fail responses from the Linux-PAM library.
The order of execution of these modules is that of the entries in the
/etc/pam.d/
directory: The control-flag can be defined with one of two
syntaxes. The simpler (and historical) syntax for the control-flag is a
single keyword defined to indicate the severity of concern associated
with the success or failure of a specific module. There are four such
keywords:
required
,
requisite
,
sufficient
and
optional
.
Keyword
Description
Required
This indicates that the success of the module is required for the module-
type facility to succeed. Failure of this module will not be apparent to
the user until all of the remaining modules (of the same module-type)
have been executed.
Table 3.6: /etc/pam.d/ keywords description
Token
Description
Table 3.5: /etc/pam.d/ tokens description
Summary of Contents for AlterPath ACS
Page 16: ...xvi Table of Contents...
Page 29: ...13 This page has been left intentionally blank...
Page 30: ...14 Preface...
Page 68: ...52 Device Access...
Page 86: ...70 Authentication Step 5 Saving changes To save the configuration run the command saveconf...
Page 96: ...80 Authentication Save the configuration to flash 2 cli config savetoflash...
Page 114: ...98 Authentication...
Page 204: ...188 Administration To exit the CLI mode and return to ACS s shell issue the command cli quit...
Page 268: ...252 Power Management with AlterPath PM Integration...
Page 304: ...288 PCMCIA Cards Integration...
Page 338: ...322 Profile Configuration...
Page 364: ...348 Additional Features and Applications...
Page 376: ...360 Appendix A New User Background Information...
Page 406: ...390 Appendix C Cabling and Hardware Information This page has been left intentionally blank...
Page 418: ...402 List of Tables...
Page 420: ...404 List of Figures...