Copyright (c) 2008, Sun Microsystems, Inc. All Rights Reserved.
The contents of this file are subject to the terms of the Common Development and Distribution License (the "License"). You may not use this file except in compliance with the License.
You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE or http://www.opensolaris.org/os/licensing. See the License for the specific language governing permissions and limitations under the License.
When distributing Covered Code, include this CDDL HEADER in each file and include the License file at usr/src/OPENSOLARIS.LICENSE. If applicable, add the following below this CDDL HEADER, with the fields enclosed by brackets "[]" replaced with your own identifying information: Portions Copyright [yyyy] [name of copyright owner]
pam_smb_passwd.so.1
The pam_sm_chauthtok() function accepts the following flags: PAM_PRELIM_CHECK
Always returns PAM_IGNORE.
Suppresses messages.
Updates or creates a new CIFS local LM/NTLM hash for the user that is specified in PAM_USER by using the authentication information found in PAM_AUTHTOK. The LM hash is only created if the smbd/lmauth_level property value of the smb/server service is set to 3 or less. PAM_IGNORE is returned if the user is not in the local /etc/passwd repository.
The following options can be passed to the pam_smb_passwd module: debug
Produces syslog(3C) debugging information at the LOG_AUTH or LOG_DEBUG level.
Suppresses warning messages.
Stores SMB passwords for users.
Authentication token manipulation error
SMB password file is locked
Permissions are insufficient for accessing the SMB password file
System error
User is unknown
ATTRIBUTE TYPE ATTRIBUTE VALUE |
Interface Stability Committed |
MT Level MT-Safe with exceptions |
The pam_smb_passwd.so.1 module should be stacked following all password qualification modules in the PAM password stack.