
27.3.2 pam_env.conf
This file can be used to define a standardized environment for users that is set whenever
the
pam_env
module is called. With it, preset environment variables using the following
syntax:
VARIABLE [DEFAULT=[value]] [OVERRIDE=[value]]
VARIABLE
Name of the environment variable to set.
[DEFAULT=[value]]
Default value the administrator wants set.
[OVERRIDE=[value]]
Values that may be queried and set by
pam_env
, overriding the default value.
A typical example of how
pam_env
can be used is the adaptation of the
DISPLAY
variable, which is changed whenever a remote login takes place. This is shown in
Ex-
ample 27.7, “pam_env.conf”
(page 501).
Example 27.7
pam_env.conf
REMOTEHOST DEFAULT=localhost OVERRIDE=@{PAM_RHOST}
DISPLAY DEFAULT=${REMOTEHOST}:0.0 OVERRIDE=${DISPLAY}
The first line sets the value of the
REMOTEHOST
variable to
localhost
, which is
used whenever
pam_env
cannot determine any other value. The
DISPLAY
variable
in turn contains the value of
REMOTEHOST
. Find more information in the comments
in the file
/etc/security/pam_env.conf
.
27.3.3 pam_pwcheck.conf
This configuration file is for the
pam_pwcheck
module, which reads options from it
for all
password
type modules. Settings stored in this file take precedence over the
PAM settings of an individual application. If application-specific settings have not been
defined, the application uses the global settings.
Example 27.8, “pam_pwcheck.conf”
(page 502) tells
pam_pwcheck
to allow empty passwords and modification of pass-
words. More options for the module are mentioned in the file
/etc/security/pam
_pwcheck.conf
.
Authentication with PAM
501
Summary of Contents for LINUX ENTERPRISE SERVER 10 - INSTALLATION AND ADMINISTRATION 11-05-2007
Page 1: ...SUSE Linux Enterprise Server www novell com 10 May 11 2007 Installation and Administration...
Page 14: ......
Page 19: ...Part I Deployment...
Page 20: ......
Page 60: ......
Page 128: ......
Page 243: ...Part II Administration...
Page 244: ......
Page 274: ......
Page 312: ......
Page 348: ......
Page 380: ......
Page 381: ...Part III System...
Page 382: ......
Page 438: ......
Page 452: ......
Page 478: ......
Page 486: ......
Page 498: ......
Page 512: ......
Page 558: ......
Page 559: ...Part IV Services...
Page 560: ......
Page 652: ......
Page 670: ......
Page 742: ......
Page 754: ......
Page 796: ......
Page 817: ...Part V Security...
Page 818: ......
Page 858: ......
Page 886: ......
Page 910: ......
Page 911: ...Part VI Troubleshooting...
Page 912: ......
Page 924: ......