8053 beefd0184a 2022-08-08 ct_chen 2 жил өмнө
..
.deps beefd0184a 2022-08-08 ct_chen 2 жил өмнө
.libs beefd0184a 2022-08-08 ct_chen 2 жил өмнө
Makefile beefd0184a 2022-08-08 ct_chen 2 жил өмнө
Makefile.am beefd0184a 2022-08-08 ct_chen 2 жил өмнө
Makefile.in beefd0184a 2022-08-08 ct_chen 2 жил өмнө
README beefd0184a 2022-08-08 ct_chen 2 жил өмнө
README.xml beefd0184a 2022-08-08 ct_chen 2 жил өмнө
pam_rootok.8 beefd0184a 2022-08-08 ct_chen 2 жил өмнө
pam_rootok.8.xml beefd0184a 2022-08-08 ct_chen 2 жил өмнө
pam_rootok.c beefd0184a 2022-08-08 ct_chen 2 жил өмнө
pam_rootok.la beefd0184a 2022-08-08 ct_chen 2 жил өмнө
pam_rootok.lo beefd0184a 2022-08-08 ct_chen 2 жил өмнө
tst-pam_rootok beefd0184a 2022-08-08 ct_chen 2 жил өмнө
tst-pam_rootok-retval.c beefd0184a 2022-08-08 ct_chen 2 жил өмнө

README

pam_rootok — Gain only root access

━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━

DESCRIPTION

pam_rootok is a PAM module that authenticates the user if their UID is 0.
Applications that are created setuid-root generally retain the UID of the user
but run with the authority of an enhanced effective-UID. It is the real UID
that is checked.

OPTIONS

debug

Print debug information.

EXAMPLES

In the case of the su(1) application the historical usage is to permit the
superuser to adopt the identity of a lesser user without the use of a password.
To obtain this behavior with PAM the following pair of lines are needed for the
corresponding entry in the /etc/pam.d/su configuration file:

# su authentication. Root is granted access by default.
auth sufficient pam_rootok.so
auth required pam_unix.so


AUTHOR

pam_rootok was written by Andrew G. Morgan, .