1.\" Copyright (c) 2001 Mark R V Murray 2.\" All rights reserved. 3.\" 4.\" Redistribution and use in source and binary forms, with or without 5.\" modification, are permitted provided that the following conditions 6.\" are met: 7.\" 1. Redistributions of source code must retain the above copyright 8.\" notice, this list of conditions and the following disclaimer. 9.\" 2. Redistributions in binary form must reproduce the above copyright 10.\" notice, this list of conditions and the following disclaimer in the 11.\" documentation and/or other materials provided with the distribution. 12.\" 13.\" THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND 14.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 15.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 16.\" ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE 17.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 18.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 19.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 20.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 21.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 22.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 23.\" SUCH DAMAGE. 24.\" 25.Dd July 7, 2001 26.Dt PAM_PERMIT 8 27.Os 28.Sh NAME 29.Nm pam_permit 30.Nd Promiscuous PAM module 31.Sh SYNOPSIS 32.Op Ar service-name 33.Ar module-type 34.Ar control-flag 35.Pa pam_permit 36.Op Ar options 37.Sh DESCRIPTION 38The Promiscuous authentication service module for PAM, 39.Nm 40provides functionality for all the PAM categories: 41authentication, 42account management, 43session management and 44password management. 45In terms of the 46.Ar module-type 47parameter, these are the 48.Dq Li auth , 49.Dq Li account , 50.Dq Li session , 51and 52.Dq Li password 53features. 54.Pp 55The Promiscuous module 56will universally allow all requests. 57It is primarily of use during testing, 58and to silence 59.Dq noisy 60PAM-enabled applications. 61.Pp 62The following options may be passed to the module: 63.Bl -tag -width ".Cm debug" 64.It Cm debug 65.Xr syslog 3 66debugging information at 67.Dv LOG_DEBUG 68level. 69.El 70.Sh SEE ALSO 71.Xr pam 3 , 72.Xr syslog 3 , 73.Xr pam.conf 5 74