2 .\" Copyright (c) 2005 Dag-Erling Coïdan Smørgrav
3 .\" All rights reserved.
5 .\" Redistribution and use in source and binary forms, with or without
6 .\" modification, are permitted provided that the following conditions
8 .\" 1. Redistributions of source code must retain the above copyright
9 .\" notice, this list of conditions and the following disclaimer.
10 .\" 2. Redistributions in binary form must reproduce the above copyright
11 .\" notice, this list of conditions and the following disclaimer in the
12 .\" documentation and/or other materials provided with the distribution.
13 .\" 3. The name of the author may not be used to endorse or promote
14 .\" products derived from this software without specific prior written
17 .\" THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
18 .\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
19 .\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
20 .\" ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
21 .\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
22 .\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
23 .\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
24 .\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
25 .\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
26 .\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
29 .\" $Id: pam.conf.5,v 1.1.1.2 2008/01/27 00:54:57 christos Exp $
36 .Nd PAM policy file format
38 The PAM library searches for policies in the following files, in
39 decreasing order of preference:
42 .Pa /etc/pam.d/ Ns Ar service-name
46 .Pa /usr/local/etc/pam.d/ Ns Ar service-name
48 .Pa /usr/local/etc/pam.conf
51 If none of these locations contains a policy for the given service,
54 policy is used instead, if it exists.
56 Entries in per-service policy files must be of one of the two forms
58 .Bd -unfilled -offset indent
59 .Ar function-class control-flag module-path Op Ar arguments ...
60 .Ar function-class Cm include Ar other-service-name
64 .Pa pam.conf Ns -style
65 policy files are of the same form, but are prefixed by an additional
66 field specifying the name of the service they apply to.
68 In both types of policy files, blank lines are ignored, as is anything
75 field specifies the class of functions the entry applies to, and is
77 .Bl -tag -width ".Cm password"
79 Authentication functions
81 .Xr pam_authenticate 3 ,
85 Account management functions
86 .Pq Xr pam_acct_mgmt 3
88 Session handling functions
90 .Xr pam_open_session 3 ,
91 .Xr pam_close_session 3
94 Password management functions
95 .Pq Xr pam_chauthtok 3
100 field determines how the result returned by the module affects the
101 flow of control through (and the final result of) the rest of the
102 chain, and is one of:
103 .Bl -tag -width ".Cm sufficient"
105 If this module succeeds, the result of the chain will be success
106 unless a later module fails.
107 If it fails, the rest of the chain still runs, but the final result
108 will be failure regardless of the success of later modules.
110 If this module succeeds, the result of the chain will be success
111 unless a later module fails.
112 If it module fails, the chain is broken and the result is failure.
114 If this module succeeds, the chain is broken and the result is
116 If it fails, the rest of the chain still runs, but the final result
117 will be failure unless a later module succeeds.
119 If this module succeeds, the chain is broken and the result is
121 If it fails, the rest of the chain still runs, but the final result
122 will be failure regardless of the success of later modules.
124 If this module succeeds, the result of the chain will be success
125 unless a later module fails.
126 If this module fails, the result of the chain will be failure unless a
127 later module succeeds.
130 There are two exceptions to the above:
134 modules are treated as
141 .Xr pam_chauthtok 3 .
145 field specifies the name, or optionally the full path, of the module
148 The remaining fields are passed as arguments to the module if and when
153 form of entry causes entries from a different chain (specified by
154 .Ar other-system-name )
155 to be included in the current one.
156 This allows one to define system-wide policies which are then included
157 into service-specific policies.
158 The system-wide policy can then be modified without having to also
159 modify each and every service-specific policy.
164 .%T "X/Open Single Sign-On Service (XSSO) - Pluggable Authentication Modules"
168 The OpenPAM library was developed for the
171 AS and Network Associates Laboratories, the Security Research Division
172 of Network Associates, Inc.\& under DARPA/SPAWAR contract
175 as part of the DARPA CHATS research program.
177 This manual page was written by
178 .An Dag-Erling Sm\(/orgrav Aq des@FreeBSD.org .