xref: /freebsd/lib/libpam/modules/pam_ksu/pam_ksu.8 (revision 6e1fc0118033f42b7c0d3623c8f67a89ebecabb2)
13a271666SJacques Vidrine.\" Copyright (c) 2001 Mark R V Murray
23a271666SJacques Vidrine.\" All rights reserved.
33a271666SJacques Vidrine.\" Copyright (c) 2001 Networks Associates Technology, Inc.
43a271666SJacques Vidrine.\" All rights reserved.
53a271666SJacques Vidrine.\"
63a271666SJacques Vidrine.\" This software was developed for the FreeBSD Project by ThinkSec AS and
73a271666SJacques Vidrine.\" NAI Labs, the Security Research Division of Network Associates, Inc.
83a271666SJacques Vidrine.\" under DARPA/SPAWAR contract N66001-01-C-8035 ("CBOSS"), as part of the
93a271666SJacques Vidrine.\" DARPA CHATS research program.
103a271666SJacques Vidrine.\"
113a271666SJacques Vidrine.\" Redistribution and use in source and binary forms, with or without
123a271666SJacques Vidrine.\" modification, are permitted provided that the following conditions
133a271666SJacques Vidrine.\" are met:
143a271666SJacques Vidrine.\" 1. Redistributions of source code must retain the above copyright
153a271666SJacques Vidrine.\"    notice, this list of conditions and the following disclaimer.
163a271666SJacques Vidrine.\" 2. Redistributions in binary form must reproduce the above copyright
173a271666SJacques Vidrine.\"    notice, this list of conditions and the following disclaimer in the
183a271666SJacques Vidrine.\"    documentation and/or other materials provided with the distribution.
193a271666SJacques Vidrine.\" 3. The name of the author may not be used to endorse or promote
203a271666SJacques Vidrine.\"    products derived from this software without specific prior written
213a271666SJacques Vidrine.\"    permission.
223a271666SJacques Vidrine.\"
233a271666SJacques Vidrine.\" THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
243a271666SJacques Vidrine.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
253a271666SJacques Vidrine.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
263a271666SJacques Vidrine.\" ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
273a271666SJacques Vidrine.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
283a271666SJacques Vidrine.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
293a271666SJacques Vidrine.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
303a271666SJacques Vidrine.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
313a271666SJacques Vidrine.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
323a271666SJacques Vidrine.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
333a271666SJacques Vidrine.\" SUCH DAMAGE.
343a271666SJacques Vidrine.\"
353a271666SJacques Vidrine.Dd May 15, 2002
3687e9be39SRuslan Ermilov.Dt PAM_KSU 8
373a271666SJacques Vidrine.Os
383a271666SJacques Vidrine.Sh NAME
393a271666SJacques Vidrine.Nm pam_ksu
403a271666SJacques Vidrine.Nd Kerberos 5 SU PAM module
413a271666SJacques Vidrine.Sh SYNOPSIS
423a271666SJacques Vidrine.Op Ar service-name
433a271666SJacques Vidrine.Ar module-type
443a271666SJacques Vidrine.Ar control-flag
453a271666SJacques Vidrine.Pa pam_ksu
463a271666SJacques Vidrine.Op Ar options
473a271666SJacques Vidrine.Sh DESCRIPTION
483a271666SJacques VidrineThe Kerberos 5 SU authentication service module for PAM,
493a271666SJacques Vidrine.Nm
503a271666SJacques Vidrinefor only one PAM category: authentication.
513a271666SJacques VidrineIn terms of the
523a271666SJacques Vidrine.Ar module-type
533a271666SJacques Vidrineparameter, this is the
543a271666SJacques Vidrine.Dq Li auth
553a271666SJacques Vidrinefeature.
563a271666SJacques VidrineThe module is specifically designed to be used with the
573a271666SJacques Vidrine.Xr su 1
583a271666SJacques Vidrineutility.
593a271666SJacques Vidrine.\" It also provides a null function for session management.
603a271666SJacques Vidrine.Ss Kerberos 5 SU Authentication Module
613a271666SJacques VidrineThe Kerberos 5 SU authentication component provides functions to verify
623a271666SJacques Vidrinethe identity of a user
633a271666SJacques Vidrine.Pq Fn pam_sm_authenticate ,
643a271666SJacques Vidrineand determine whether or not the user is authorized to obtain the
653a271666SJacques Vidrineprivileges of the target account.
669baa2c98SRuslan ErmilovIf the target account is
679baa2c98SRuslan Ermilov.Dq root ,
689baa2c98SRuslan Ermilovthen the Kerberos 5 principal used
699baa2c98SRuslan Ermilovfor authentication and authorization will be the
709baa2c98SRuslan Ermilov.Dq root
719baa2c98SRuslan Ermilovinstance of
729baa2c98SRuslan Ermilovthe current user, e.g.\&
739baa2c98SRuslan Ermilov.Dq Li user/root@REAL.M .
743a271666SJacques VidrineOtherwise, the principal will simply be the current user's default
759baa2c98SRuslan Ermilovprincipal, e.g.\&
769baa2c98SRuslan Ermilov.Dq Li user@REAL.M .
773a271666SJacques Vidrine.Pp
789baa2c98SRuslan ErmilovThe user is prompted for a password if necessary.
799baa2c98SRuslan ErmilovAuthorization is performed
803a271666SJacques Vidrineby comparing the Kerberos 5 principal with those listed in the
813a271666SJacques Vidrine.Pa .k5login
823a271666SJacques Vidrinefile in the target account's home directory
839baa2c98SRuslan Ermilov(e.g.\&
849baa2c98SRuslan Ermilov.Pa /root/.k5login
859baa2c98SRuslan Ermilovfor root).
863a271666SJacques Vidrine.Pp
873a271666SJacques VidrineThe following options may be passed to the authentication module:
883a271666SJacques Vidrine.Bl -tag -width ".Cm use_first_pass"
893a271666SJacques Vidrine.It Cm debug
903a271666SJacques Vidrine.Xr syslog 3
913a271666SJacques Vidrinedebugging information at
923a271666SJacques Vidrine.Dv LOG_DEBUG
933a271666SJacques Vidrinelevel.
943a271666SJacques Vidrine.It Cm use_first_pass
953a271666SJacques VidrineIf the authentication module
963a271666SJacques Vidrineis not the first in the stack,
973a271666SJacques Vidrineand a previous module
983a271666SJacques Vidrineobtained the user's password,
993a271666SJacques Vidrinethat password is used
1003a271666SJacques Vidrineto authenticate the user.
1013a271666SJacques VidrineIf this fails,
1023a271666SJacques Vidrinethe authentication module returns failure
1033a271666SJacques Vidrinewithout prompting the user for a password.
1043a271666SJacques VidrineThis option has no effect
1053a271666SJacques Vidrineif the authentication module
1063a271666SJacques Vidrineis the first in the stack,
1073a271666SJacques Vidrineor if no previous modules
1083a271666SJacques Vidrineobtained the user's password.
1093a271666SJacques Vidrine.It Cm try_first_pass
1103a271666SJacques VidrineThis option is similar to the
1113a271666SJacques Vidrine.Cm use_first_pass
1123a271666SJacques Vidrineoption,
1133a271666SJacques Vidrineexcept that if the previously obtained password fails,
1143a271666SJacques Vidrinethe user is prompted for another password.
1153a271666SJacques Vidrine.El
1163a271666SJacques Vidrine.Sh SEE ALSO
1173a271666SJacques Vidrine.Xr su 1 ,
118*6e1fc011SGraham Percival.Xr pam 3 ,
1193a271666SJacques Vidrine.Xr syslog 3 ,
120*6e1fc011SGraham Percival.Xr pam.conf 5
121