модуль PAM для разрешения / запрета входа в систему в зависимости от состояния принудительного выполнения SELinux (PAM module to allow/deny login depending on SELinux enforcement state)
Имя (Name)
pam_sepermit - PAM module to allow/deny login depending on
SELinux enforcement state
Синопсис (Synopsis)
pam_sepermit.so
[debug] [conf=/path/to/config/file]
Описание (Description)
The pam_sepermit module allows or denies login depending on
SELinux enforcement state.
When the user which is logging in matches an entry in the config
file he is allowed access only when the SELinux is in enforcing
mode. Otherwise he is denied access. For users not matching any
entry in the config file the pam_sepermit module returns
PAM_IGNORE return value.
The config file contains a list of user names one per line with
optional arguments. If the name is prefixed with @ character it
means that all users in the group name match. If it is prefixed
with a % character the SELinux user is used to match against the
name instead of the account name. Note that when SELinux is
disabled the SELinux user assigned to the account cannot be
determined. This means that such entries are never matched when
SELinux is disabled and pam_sepermit will return PAM_IGNORE.
See sepermit.conf(5) for details.
Параметры (Options)
debug
Turns on debugging via syslog(3).
conf=
/path/to/config/file
Path to alternative config file overriding the default.
Предоставляемые типы модулей (Module types provided)
The auth
and account
module types are provided.
Возвращаемое значение (Return value)
PAM_AUTH_ERR
SELinux is disabled or in the permissive mode and the user
matches.
PAM_SUCCESS
SELinux is in the enforcing mode and the user matches.
PAM_IGNORE
The user does not match any entry in the config file.
PAM_USER_UNKNOWN
The module was unable to determine the user's name.
PAM_SERVICE_ERR
Error during reading or parsing the config file.
Файлы (Files)
/etc/security/sepermit.conf
Default configuration file
Примеры (Examples)
auth [success=done ignore=ignore default=bad] pam_sepermit.so
auth required pam_unix.so
account required pam_unix.so
session required pam_permit.so
Смотри также (See also)
sepermit.conf(5), pam.conf(5), pam.d(5), pam(8)selinux(8)