Nicolas Williams wrote:
> On Mon, Oct 06, 2008 at 07:02:49PM +0200, Bart Blanquart wrote:
>> On 10/06/08 18:33, Nicolas Williams wrote:
>>>> ... pam_authorized.so.1 profile="Login to %f"
>>> Me too, but I'd prefer if we stored this in /etc/security/policy.conf,
>>> not in pam.conf module arguments.
>> How would that permit per-stack authorizations, if you want to 
>> differentiate authorizations based on the service being invoked?
> 
> But do we need per-service authorizations?  If we do, then simply add a
> service name token (%S) to the profile configured in policy.conf(4) for
> pam_authorized.

That just moves the "upgrade burden" from pam.conf to policy.conf.

One of the main reasons we choose to have the configuration available as 
module options rather than in some config file was to allow for multiple 
  different stacks to have a completely different use of pam_authorized 
and to allow multiple pam_authorized entries with a different config in 
multiple places in the same stack.

For example:

# sshd pubkey just needs the "default" solaris.login.remote auth
# but for kbdint we need our site specific site.foobar and example.login
sshd-pubkey account required pam_authorized.so.1
sshd-kbdint account required pam_authorized.so.1 auths=site.foobar
sshd-kbdint account required pam_authorized.so.1 auths=example.login
gdm account required pam_authorized.so.1 auths=site.foobar

Allowing multiple pam_authorized entries in the same stack provide the 
ability to do AND operations.

Personally I'd prefer we had pam.conf module arguments than adding more 
cruft to policy.conf.

-- 
Darren J Moffat

Reply via email to