PNG  IHDR* pHYs+ IDATx]n#; cdLb Ǚ[at¤_:uP}>!Usă cag޿ ֵNu`ݼTâabO7uL&y^wFٝA"l[|ŲHLN밪4*sG3|Dv}?+y߉{OuOAt4Jj.u]Gz*҉sP'VQKbA1u\`& Af;HWj hsO;ogTu uj7S3/QzUr&wS`M$X_L7r2;aE+ώ%vikDA:dR+%KzƉo>eOth$z%: :{WwaQ:wz%4foɹE[9<]#ERINƻv溂E%P1i01 |Jvҗ&{b?9g=^wζXn/lK::90KwrюO\!ջ3uzuGv^;騢wq<Iatv09:tt~hEG`v;3@MNZD.1]L:{ծI3`L(÷ba")Y.iljCɄae#I"1 `3*Bdz>j<fU40⨬%O$3cGt]j%Fߠ_twJ;ABU8vP3uEԑwQ V:h%))LfraqX-ۿX]v-\9I gl8tzX ]ecm)-cgʒ#Uw=Wlێn(0hPP/ӨtQ“&J35 $=]r1{tLuǮ*i0_;NƝ8;-vݏr8+U-kruȕYr0RnC]*ެ(M:]gE;{]tg(#ZJ9y>utRDRMdr9㪩̞zֹb<ģ&wzJM"iI( .ꮅX)Qw:9,i좜\Ԛi7&N0:asϓc];=ΗOӣ APqz93 y $)A*kVHZwBƺnWNaby>XMN*45~ղM6Nvm;A=jֲ.~1}(9`KJ/V F9[=`~[;sRuk]rєT!)iQO)Y$V ی ۤmzWz5IM Zb )ˆC`6 rRa}qNmUfDsWuˤV{ Pݝ'=Kֳbg,UҘVz2ﴻnjNgBb{? ߮tcsͻQuxVCIY۠:(V뺕 ٥2;t`@Fo{Z9`;]wMzU~%UA蛚dI vGq\r82iu +St`cR.6U/M9IENDB` REDROOM
PHP 5.6.40
Preview: sag-pam_wheel.html Size: 7.01 KB
/usr/share/doc/pam/html/sag-pam_wheel.html

<html><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8"><title>6.40. pam_wheel - only permit root access to members of group wheel</title><meta name="generator" content="DocBook XSL Stylesheets Vsnapshot"><link rel="home" href="Linux-PAM_SAG.html" title="The Linux-PAM System Administrators' Guide"><link rel="up" href="sag-module-reference.html" title="Chapter 6. A reference guide for available modules"><link rel="prev" href="sag-pam_warn.html" title="6.39. pam_warn - logs all PAM items"><link rel="next" href="sag-pam_xauth.html" title="6.41. pam_xauth - forward xauth keys between users"></head><body bgcolor="white" text="black" link="#0000FF" vlink="#840084" alink="#0000FF"><div class="navheader"><table width="100%" summary="Navigation header"><tr><th colspan="3" align="center">6.40. pam_wheel - only permit root access to members of group wheel</th></tr><tr><td width="20%" align="left"><a accesskey="p" href="sag-pam_warn.html">Prev</a> </td><th width="60%" align="center">Chapter 6. A reference guide for available modules</th><td width="20%" align="right"> <a accesskey="n" href="sag-pam_xauth.html">Next</a></td></tr></table><hr></div><div class="section"><div class="titlepage"><div><div><h2 class="title" style="clear: both"><a name="sag-pam_wheel"></a>6.40. pam_wheel - only permit root access to members of group wheel</h2></div></div></div><div class="cmdsynopsis"><p><code class="command">pam_wheel.so</code>  [
	debug
      ] [
        deny
      ] [
	group=<em class="replaceable"><code>name</code></em>
      ] [
	root_only
      ] [
	trust
      ] [
	use_uid
      ]</p></div><div class="section"><div class="titlepage"><div><div><h3 class="title"><a name="sag-pam_wheel-description"></a>6.40.1. DESCRIPTION</h3></div></div></div><p>
      The pam_wheel PAM module is used to enforce the so-called
      <span class="emphasis"><em>wheel</em></span> group. By default it permits root
      access to the system if the applicant user is a member of the
      <span class="emphasis"><em>wheel</em></span> group. If no group with this name exist,
      the module is using the group with the group-ID
      <span class="emphasis"><em>0</em></span>.
    </p></div><div class="section"><div class="titlepage"><div><div><h3 class="title"><a name="sag-pam_wheel-options"></a>6.40.2. OPTIONS</h3></div></div></div><div class="variablelist"><dl class="variablelist"><dt><span class="term">
          <code class="option">debug</code>
        </span></dt><dd><p>
            Print debug information.
          </p></dd><dt><span class="term">
          <code class="option">deny</code>
        </span></dt><dd><p>
            Reverse the sense of the auth operation: if the user
            is trying to get UID 0 access and is a member of the
            wheel group (or the group of the <code class="option">group</code> option),
            deny access. Conversely, if the user is not in the group, return
            PAM_IGNORE (unless <code class="option">trust</code> was also specified,
            in which case we return PAM_SUCCESS).
          </p></dd><dt><span class="term">
          <code class="option">group=<em class="replaceable"><code>name</code></em></code>
        </span></dt><dd><p>
            Instead of checking the wheel or GID 0 groups, use
            the <code class="option"><em class="replaceable"><code>name</code></em></code> group
            to perform the authentication.
          </p></dd><dt><span class="term">
          <code class="option">root_only</code>
        </span></dt><dd><p>
            The check for wheel membership is done only when the target user
            UID is 0.
          </p></dd><dt><span class="term">
          <code class="option">trust</code>
        </span></dt><dd><p>
            The pam_wheel module will return PAM_SUCCESS instead
            of PAM_IGNORE if the user is a member of the wheel group
            (thus with a little play stacking the modules the wheel
            members may be able to su to root without being prompted
            for a passwd).
          </p></dd><dt><span class="term">
          <code class="option">use_uid</code>
        </span></dt><dd><p>
            The check will be done against the real uid of the calling process,
            instead of trying to obtain the user from the login session
            associated with the terminal in use.
          </p></dd></dl></div></div><div class="section"><div class="titlepage"><div><div><h3 class="title"><a name="sag-pam_wheel-types"></a>6.40.3. MODULE TYPES PROVIDED</h3></div></div></div><p>
      The <span class="emphasis"><em>auth</em></span> and
      <span class="emphasis"><em>account</em></span> module types are provided.
    </p></div><div class="section"><div class="titlepage"><div><div><h3 class="title"><a name="sag-pam_wheel-return_values"></a>6.40.4. RETURN VALUES</h3></div></div></div><div class="variablelist"><dl class="variablelist"><dt><span class="term">PAM_AUTH_ERR</span></dt><dd><p>
             Authentication failure.
          </p></dd><dt><span class="term">PAM_BUF_ERR</span></dt><dd><p>
             Memory buffer error.
          </p></dd><dt><span class="term">PAM_IGNORE</span></dt><dd><p>
            The return value should be ignored by PAM dispatch.
          </p></dd><dt><span class="term">PAM_PERM_DENY</span></dt><dd><p>
            Permission denied.
          </p></dd><dt><span class="term">PAM_SERVICE_ERR</span></dt><dd><p>
	    Cannot determine the user name.
          </p></dd><dt><span class="term">PAM_SUCCESS</span></dt><dd><p>
            Success.
          </p></dd><dt><span class="term">PAM_USER_UNKNOWN</span></dt><dd><p>
            User not known.
          </p></dd></dl></div></div><div class="section"><div class="titlepage"><div><div><h3 class="title"><a name="sag-pam_wheel-examples"></a>6.40.5. EXAMPLES</h3></div></div></div><p>
      The root account gains access by default (rootok), only wheel
      members can become root (wheel) but Unix authenticate non-root
      applicants.
      </p><pre class="programlisting">
su      auth     sufficient     pam_rootok.so
su      auth     required       pam_wheel.so
su      auth     required       pam_unix.so
      </pre><p>
    </p></div><div class="section"><div class="titlepage"><div><div><h3 class="title"><a name="sag-pam_wheel-author"></a>6.40.6. AUTHOR</h3></div></div></div><p>
        pam_wheel was written by Cristian Gafton &lt;gafton@redhat.com&gt;.
      </p></div></div><div class="navfooter"><hr><table width="100%" summary="Navigation footer"><tr><td width="40%" align="left"><a accesskey="p" href="sag-pam_warn.html">Prev</a> </td><td width="20%" align="center"><a accesskey="u" href="sag-module-reference.html">Up</a></td><td width="40%" align="right"> <a accesskey="n" href="sag-pam_xauth.html">Next</a></td></tr><tr><td width="40%" align="left" valign="top">6.39. pam_warn - logs all PAM items </td><td width="20%" align="center"><a accesskey="h" href="Linux-PAM_SAG.html">Home</a></td><td width="40%" align="right" valign="top"> 6.41. pam_xauth - forward xauth keys between users</td></tr></table></div></body></html>

Directory Contents

Dirs: 0 × Files: 54

Name Size Perms Modified Actions
8.98 KB lrw-r--r-- 2025-12-17 18:53:47
Edit Download
3.04 KB lrw-r--r-- 2025-12-17 18:53:47
Edit Download
2.90 KB lrw-r--r-- 2025-12-17 18:53:47
Edit Download
5.39 KB lrw-r--r-- 2025-12-17 18:53:47
Edit Download
17.11 KB lrw-r--r-- 2025-12-17 18:53:47
Edit Download
2.99 KB lrw-r--r-- 2025-12-17 18:53:47
Edit Download
3.53 KB lrw-r--r-- 2025-12-17 18:53:47
Edit Download
4.34 KB lrw-r--r-- 2025-12-17 18:53:46
Edit Download
37.26 KB lrw-r--r-- 2025-12-17 18:53:47
Edit Download
7.81 KB lrw-r--r-- 2025-12-17 18:53:47
Edit Download
17.70 KB lrw-r--r-- 2025-12-17 18:53:47
Edit Download
19.80 KB lrw-r--r-- 2025-12-17 18:53:47
Edit Download
7.90 KB lrw-r--r-- 2025-12-17 18:53:47
Edit Download
4.59 KB lrw-r--r-- 2025-12-17 18:53:47
Edit Download
5.62 KB lrw-r--r-- 2025-12-17 18:53:47
Edit Download
12.50 KB lrw-r--r-- 2025-12-17 18:53:47
Edit Download
8.17 KB lrw-r--r-- 2025-12-17 18:53:47
Edit Download
4.48 KB lrw-r--r-- 2025-12-17 18:53:47
Edit Download
9.12 KB lrw-r--r-- 2025-12-17 18:53:47
Edit Download
6.06 KB lrw-r--r-- 2025-12-17 18:53:47
Edit Download
9.90 KB lrw-r--r-- 2025-12-17 18:53:47
Edit Download
6.23 KB lrw-r--r-- 2025-12-17 18:53:47
Edit Download
6.85 KB lrw-r--r-- 2025-12-17 18:53:47
Edit Download
8.32 KB lrw-r--r-- 2025-12-17 18:53:47
Edit Download
17.69 KB lrw-r--r-- 2025-12-17 18:53:47
Edit Download
10.29 KB lrw-r--r-- 2025-12-17 18:53:47
Edit Download
5.32 KB lrw-r--r-- 2025-12-17 18:53:47
Edit Download
5.09 KB lrw-r--r-- 2025-12-17 18:53:47
Edit Download
7.58 KB lrw-r--r-- 2025-12-17 18:53:47
Edit Download
6.05 KB lrw-r--r-- 2025-12-17 18:53:47
Edit Download
7.57 KB lrw-r--r-- 2025-12-17 18:53:47
Edit Download
20.16 KB lrw-r--r-- 2025-12-17 18:53:47
Edit Download
5.21 KB lrw-r--r-- 2025-12-17 18:53:47
Edit Download
4.20 KB lrw-r--r-- 2025-12-17 18:53:47
Edit Download
8.28 KB lrw-r--r-- 2025-12-17 18:53:47
Edit Download
6.25 KB lrw-r--r-- 2025-12-17 18:53:47
Edit Download
4.99 KB lrw-r--r-- 2025-12-17 18:53:47
Edit Download
6.33 KB lrw-r--r-- 2025-12-17 18:53:47
Edit Download
8.12 KB lrw-r--r-- 2025-12-17 18:53:47
Edit Download
4.16 KB lrw-r--r-- 2025-12-17 18:53:47
Edit Download
8.94 KB lrw-r--r-- 2025-12-17 18:53:47
Edit Download
9.50 KB lrw-r--r-- 2025-12-17 18:53:47
Edit Download
6.73 KB lrw-r--r-- 2025-12-17 18:53:47
Edit Download
6.17 KB lrw-r--r-- 2025-12-17 18:53:47
Edit Download
14.70 KB lrw-r--r-- 2025-12-17 18:53:47
Edit Download
8.38 KB lrw-r--r-- 2025-12-17 18:53:47
Edit Download
4.46 KB lrw-r--r-- 2025-12-17 18:53:47
Edit Download
7.01 KB lrw-r--r-- 2025-12-17 18:53:47
Edit Download
8.22 KB lrw-r--r-- 2025-12-17 18:53:47
Edit Download
2.92 KB lrw-r--r-- 2025-12-17 18:53:47
Edit Download
2.89 KB lrw-r--r-- 2025-12-17 18:53:47
Edit Download
2.11 KB lrw-r--r-- 2025-12-17 18:53:47
Edit Download
2.23 KB lrw-r--r-- 2025-12-17 18:53:47
Edit Download
3.11 KB lrw-r--r-- 2025-12-17 18:53:47
Edit Download

If ZipArchive is unavailable, a .tar will be created (no compression).
© 2026 REDROOM — Secure File Manager. All rights reserved. Built with ❤️ & Red Dark UI