On 10/06/08 15:41, Joerg Barfurth wrote:
> One thing I am missing here is a way to use this module with explicitly 
> specified authorizations, but without requiring one of the 
> solaris.login.* authorizations (or with an additional one).
> 
> PAM is being used to authenticate and authorize access to services that 
> are not really system login access. Some examples I can think of from 
> the Sun Ray are are registering Sun Ray devices or smart card tokens for 
> use with the system or access to the Sun Ray administration web console. 
> In both cases it makes sense to use the usual name services and 
> authentication mechanisms for the user accounts, and it would be great 
> to use an authorization to manage the administrative roles, but in 
> neither case is login or login-like access granted. (From the PAM side 
> this is reflected in that the session module functions are not used.)

See below for how to avoid the need for solaris.login. authorizations.

> BTW: Do you plan to document in more detail how the distinction 
> console/local/remote is made by the module? What combinations of 
> PAM_TTY, PAM_RHOST and other items must a PAM client set in order to 
> signal one of these cases?

If PAM_RHOST is set we check for solaris.login.remote;
if PAM_TTY is /dev/console we check for solaris.login.console;
if PAM_TTY is something else and PAM_RHOST is not set we check for 
solaris.login.local.

If PAM_TTY is unset and PAM_RHOST is unset we don't check for any 
solaris.login.{local,remote,console} authorization.

Bart

Reply via email to