Pam handling problem

Pam handling problem

Post by vi.. » Fri, 11 Aug 2000 04:00:00



the problem is something like this :---

for some reasons i want to stop usage of passwd for some time.
so i decided to edit /etc/pam.d/passwd (on a redhat system)
now the first line of the file was

auth     required     deny.so

I expected that nobody will be able to change passwd now but this was
found to be untrue.
Can somebody explain me how to do so.

I would also like to know how can i stop a particular user (say guest)
from changing his passwd using the pam file. I want to allow everybody
except guest to have permission to change passwd.

Sent via Deja.com http://www.deja.com/
Before you buy.

 
 
 

Pam handling problem

Post by vi.. » Fri, 11 Aug 2000 04:00:00


the problem is something like this :---

for some reasons i want to stop usage of passwd for some time.
so i decided to edit /etc/pam.d/passwd (on a redhat system)
now the first line of the file was

auth     required     deny.so

I expected that nobody will be able to change passwd now but this was
found to be untrue.
Can somebody explain me how to do so.

I would also like to know how can i stop a particular user (say guest)
from changing his passwd using the pam file. I want to allow everybody
except guest to have permission to change passwd.

Sent via Deja.com http://www.deja.com/
Before you buy.

 
 
 

1. PAM (/etc/pam.conf).....Is It Needed?

I do not have much experience with PAM, but in conversations with
others relating to our Solaris servers (versions 2.6 thru 9), I'm under
the impression that we are not using it.

In a recent audit of some of our files, we were cited with having some
servers "less secure" than others simply by virtue of the entries
within /etc/pam.conf.  They do seem to differ, especially when
comparing the 2.6 servers with more current versions (7 thru 9).

My questions become: "IF we are not using PAM, I would presume that we
do not have a need to access the /etc/pam.conf file.  That being said,
do we even need it (i.e. can it be removed without serious
ramifications)?  How would one go about determining IF it is "actually"
being used?

Thanks.

2. Setup HD....

3. PAM/RedHat: pop3 /etc/pam.d config

4. Configura?ao

5. ftp chroot jail dir & pam 1.0 /etc/pam.d/ftp file

6. gids in kernel

7. redhat 6.1, PAM, and having to alter /etc/pam.d/kppp

8. Missing Libraries and imake

9. PAM and /etc/pam.conf

10. Q: Handling large mail loads....how to distribute mail handling??

11. PAM problem

12. problem with pam and gdm

13. 4.6 - PAM problems running X