Heya folks,

I've recently become aware of the niftiness of pam_timestamp. Its a pam
module that can be used to give a user a timestamp (that lasts, say,
five
minutes) when entering some credentials (say, a password) to prove that
you recently entered those credentials sucessfully.

It apparently came about from the sudo program. Red Hat use it in all
their redhat-config-whatever programs to stop hassling users each time
they want to run some tool that requires root privileges. Run the tool,
enter the password once, get a set of keys representing your credentials
in the gnome taskbar, and, if you run another tool requiring the root
password, pam_timestamp is sufficient to run the tool.

Its really nifty. So I'd like to use for su to save me some time.

According to the doco (and my own experience of pam), all that should be
needed to get su to check for the timestamp and allow me to switch user
if
its there is:

auth sufficent pam_timestamp.so

at the top of /etc/pam.d/sudo (beneath the #%PAM-1.0 line)

Which I've done. But it doesn't seem to work. Any ideas folks?

Thanks muchly. This will save me stacks of time if I can get it to work.

Mike
-- 
__________________________________________________________________________
Mike MacCana              Consultant            RHCX, MCSE, MCP+I
Cybersource: Providing Quality IT Professional Services for 11 Years
Specialists in Unix/Linux, TCP/IP and Web Application Development
Level 4, 10 Queen St, Melbourne.  Ph : 03 9621 2377 Fax: 03 9621 2477

-- 
SLUG - Sydney Linux User's Group Mailing List - http://slug.org.au/
Subscription info and FAQs: http://slug.org.au/faq/mailinglists.html

Reply via email to