Linux Command Library
commands
Commands
basic
Basic
tips
Tips

pam_loginuid

Record user's login uid to the process attribute

pam_loginuid.so [require_auditd]

The pam_loginuid module sets the loginuid process attribute for the process that was authenticated. This is necessary for applications to be correctly audited. This PAM module should only be used for entry point applications like: login, sshd, gdm, vsftpd, crond and atd. There are probably other entry point applications besides these. You should not use it for applications like sudo or su as that defeats the purpose by changing the loginuid to the account they just switched to.

require_auditd

This option, when given, will cause this module to query the audit daemon status and deny logins if it is not running.

Only the session module type is provided.

PAM_SESSION_ERR

An error occurred during session management.

#%PAM-1.0 auth required pam_unix.so auth required pam_nologin.so account required pam_unix.so password required pam_unix.so session required pam_unix.so session required pam_loginuid.so 

pam.conf(5), pam.d(5), pam(7), auditctl(8), auditd(8)

pam_loginuid was written by Steve Grubb <sgrubb@redhat.com>

play store download app store download
Imprint
Sonnenallee 29, 12047 Berlin, Germany
e-mail: sschubert89@gmail.com

Privacy policy
Successfully copied