8053 beefd0184a 2022-08-08 ct_chen 2 years ago
..
.deps beefd0184a 2022-08-08 ct_chen 2 years ago
.libs beefd0184a 2022-08-08 ct_chen 2 years ago
Makefile beefd0184a 2022-08-08 ct_chen 2 years ago
Makefile.am beefd0184a 2022-08-08 ct_chen 2 years ago
Makefile.in beefd0184a 2022-08-08 ct_chen 2 years ago
README beefd0184a 2022-08-08 ct_chen 2 years ago
README.xml beefd0184a 2022-08-08 ct_chen 2 years ago
pam_rootok.8 beefd0184a 2022-08-08 ct_chen 2 years ago
pam_rootok.8.xml beefd0184a 2022-08-08 ct_chen 2 years ago
pam_rootok.c beefd0184a 2022-08-08 ct_chen 2 years ago
pam_rootok.la beefd0184a 2022-08-08 ct_chen 2 years ago
pam_rootok.lo beefd0184a 2022-08-08 ct_chen 2 years ago
tst-pam_rootok beefd0184a 2022-08-08 ct_chen 2 years ago
tst-pam_rootok-retval.c beefd0184a 2022-08-08 ct_chen 2 years ago

README

pam_rootok — Gain only root access

━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━

DESCRIPTION

pam_rootok is a PAM module that authenticates the user if their UID is 0.
Applications that are created setuid-root generally retain the UID of the user
but run with the authority of an enhanced effective-UID. It is the real UID
that is checked.

OPTIONS

debug

Print debug information.

EXAMPLES

In the case of the su(1) application the historical usage is to permit the
superuser to adopt the identity of a lesser user without the use of a password.
To obtain this behavior with PAM the following pair of lines are needed for the
corresponding entry in the /etc/pam.d/su configuration file:

# su authentication. Root is granted access by default.
auth sufficient pam_rootok.so
auth required pam_unix.so


AUTHOR

pam_rootok was written by Andrew G. Morgan, .