Current File : //usr/man/man5/pam_allow.5
'\" te
.\" Copyright (c) 2005, 2012, Oracle and/or its affiliates. All rights reserved.
.TH pam_allow 5 "23 May 2012" "SunOS 5.11" "Standards, Environments, and Macros"
.SH NAME
pam_allow \- PAM authentication, account, session and password management PAM module to allow operations
.SH SYNOPSIS
.LP
.nf
\fBpam_allow.so.1\fR
.fi

.SH DESCRIPTION
.sp
.LP
The \fBpam_allow\fR module implements all the PAM service module functions and returns \fBPAM_SUCCESS\fR for all calls. Opposite functionality is available in the \fBpam_deny\fR(5) module.
.sp
.LP
Proper Solaris authentication operation requires \fBpam_unix_cred\fR(5) be stacked above \fBpam_allow\fR.
.sp
.LP
The following options are interpreted: 
.sp
.ne 2
.mk
.na
\fBdebug\fR
.ad
.RS 9n
.rt  
Provides \fBsyslog\fR(3C) debugging information at the \fBLOG_AUTH | LOG_DEBUG\fR level.
.RE

.SH ERRORS
.sp
.LP
\fBPAM_SUCCESS\fR is always returned.
.SH EXAMPLES
.LP
\fBExample 1 \fRAllowing \fBssh none\fR
.sp
.LP
The following example is a \fBpam.conf\fR fragment that illustrates how to allow the SSHv2 \fBuserauth\fR of "none":

.sp
.in +2
.nf
sshd-none  auth    required      pam_unix_cred.so.1
sshd-none  auth    sufficient    pam_allow.so.1
sshd-none  account sufficient    pam_allow.so.1
sshd-none  session sufficient    pam_allow.so.1
sshd-none  password sufficient   pam_allow.so.1
.fi
.in -2

.sp
.LP
The equivalent configuration using \fB/etc/pam.d/\fR would be the following entries in \fB/etc/pam.d/sshd-none\fR:

.sp
.in +2
.nf
auth    required      pam_unix_cred.so.1
auth    sufficient    pam_allow.so.1
account sufficient    pam_allow.so.1
session sufficient    pam_allow.so.1
password sufficient   pam_allow.so.1
.fi
.in -2

.LP
\fBExample 2 \fRAllowing Kiosk Automatic Login Service
.sp
.LP
The following example is a \fBpam.conf\fR fragment that illustrates how to allow \fBgdm\fR kiosk automatic login:

.sp
.in +2
.nf
gdm-autologin auth  required    pam_unix_cred.so.1
gdm-autologin auth  sufficient  pam_allow.so.1
.fi
.in -2

.sp
.LP
The equivalent configuration using \fB/etc/pam.d/\fR would be the following entries in \fB/etc/pam.d/gdm-autologin\fR:

.sp
.in +2
.nf
auth  required    pam_unix_cred.so.1
auth  sufficient  pam_allow.so.1
.fi
.in -2

.SH ATTRIBUTES
.sp
.LP
See \fBattributes\fR(5) for descriptions of the following attributes:
.sp

.sp
.TS
tab() box;
cw(2.75i) |cw(2.75i) 
lw(2.75i) |lw(2.75i) 
.
ATTRIBUTE TYPEATTRIBUTE VALUE
_
Interface StabilityCommitted
_
MT LevelMT-Safe with exceptions
.TE

.SH SEE ALSO
.sp
.LP
\fBlibpam\fR(3LIB), \fBpam\fR(3PAM), \fBpam_sm\fR(3PAM), \fBsyslog\fR(3C), \fBpam.conf\fR(4), \fBattributes\fR(5), \fBpam_deny\fR(5), \fBpam_unix_cred\fR(5)
.SH NOTES
.sp
.LP
The interfaces in \fBlibpam\fR(3LIB) are MT-Safe only if each thread within the multi-threaded application uses its own PAM handle.
.sp
.LP
This module is intended to be used to either allow access to specific services names, or to all service names not specified (by specifying it as the default service stack).