README 1.9 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061
  1. pam_wheel — Only permit root access to members of group wheel
  2. ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
  3. DESCRIPTION
  4. The pam_wheel PAM module is used to enforce the so-called wheel group. By
  5. default it permits access to the target user if the applicant user is a member
  6. of the wheel group. If no group with this name exist, the module is using the
  7. group with the group-ID 0.
  8. OPTIONS
  9. debug
  10. Print debug information.
  11. deny
  12. Reverse the sense of the auth operation: if the user is trying to get UID 0
  13. access and is a member of the wheel group (or the group of the group
  14. option), deny access. Conversely, if the user is not in the group, return
  15. PAM_IGNORE (unless trust was also specified, in which case we return
  16. PAM_SUCCESS).
  17. group=name
  18. Instead of checking the wheel or GID 0 groups, use the name group to
  19. perform the authentication.
  20. root_only
  21. The check for wheel membership is done only when the target user UID is 0.
  22. trust
  23. The pam_wheel module will return PAM_SUCCESS instead of PAM_IGNORE if the
  24. user is a member of the wheel group (thus with a little play stacking the
  25. modules the wheel members may be able to su to root without being prompted
  26. for a passwd).
  27. use_uid
  28. The check will be done against the real uid of the calling process, instead
  29. of trying to obtain the user from the login session associated with the
  30. terminal in use.
  31. EXAMPLES
  32. The root account gains access by default (rootok), only wheel members can
  33. become root (wheel) but Unix authenticate non-root applicants.
  34. su auth sufficient pam_rootok.so
  35. su auth required pam_wheel.so
  36. su auth required pam_unix.so
  37. AUTHOR
  38. pam_wheel was written by Cristian Gafton <gafton@redhat.com>.