Searched refs:PAM (Results 1 – 25 of 88) sorted by relevance
1234
11 + [AS_HELP_STRING([--without-pam], [without PAM support])])16 - AC_DEFINE(HAVE_PAM, 1, [Define to 1 for PAM support])18 + AC_DEFINE(HAVE_PAM, 1, [Define to 1 for PAM support])],20 + AC_MSG_ERROR([PAM selected but security/pam_misc.h not found])
34 #%PAM-1.044 #%PAM-1.054 #%PAM-1.064 #%PAM-1.074 #%PAM-1.084 #%PAM-1.094 #%PAM-1.0104 #%PAM-1.0114 #%PAM-1.0
28 /* Note: PAM auth is quite simple and only works for PAM modules which just do31 * but there's an interface via a PAM module. It won't work for more complex32 * PAM challenge/response.33 * You can't enable both PASSWORD and PAM. */
1 #%PAM-1.0
63 # with some PAM modules and threads)76 # Set this to 'yes' to enable PAM authentication, account processing,77 # and session processing. If this is enabled, PAM authentication will79 # PasswordAuthentication. Depending on your PAM configuration,80 # PAM authentication via KbdInteractiveAuthentication may bypass82 # If you just want the PAM account and session checks to run without83 # PAM authentication, then enable this but set PasswordAuthentication
2 SUMMARY = "Linux-PAM (Pluggable Authentication Modules)"3 DESCRIPTION = "Linux-PAM (Pluggable Authentication Modules for Linux), a flexible mechanism for aut…7 # PAM is dual licensed under GPL and BSD.15 SRC_URI = "${GITHUB_BASE_URI}/download/v${PV}/Linux-PAM-${PV}.tar.xz \34 S = "${WORKDIR}/Linux-PAM-${PV}"50 FILES:${PN}-xtests = "${datadir}/Linux-PAM/xtests"114 'PAM plugin for %s', hook=pam_plugin_hook, extra_depends='', prepend=True)115 …do_split_packages(d, pam_filterdir, r'^(.*)$', 'pam-filter-%s', 'PAM filter for %s', extra_depends…
1 config PAM config47 select PAM56 select PAM
1 # Remove pwquality from PAM, to avoid breaking PAM and further dependencies7 # Remove reference to pwquality library from PAM config file
1 SUMMARY = "PAM modules for IPMI support"2 DESCRIPTION = "PAM modules managing password for IPMI"
1 SUMMARY = "Google Authenticator PAM module"17 # Use the same dir location as PAM
1 SUMMARY = "PAM module for RADIUS authentication"2 DESCRIPTION = "This allows any PAM-capable machine to become a RADIUS client for \
4 Subject: [PATCH] cronie: enable PAM support for cronie23 # Although no PAM authentication is called, auth modules
2 # /etc/pam.d/other - specify the PAM fallback behaviour11 #specific PAM rules for the service and aid to debugging). Then to be
26 # Check for PAM support27 AC_ARG_WITH(pam, AC_HELP_STRING([--with-pam],[Use PAM for authentication]),
30 "PAM support.");33 + Logs.warn("PAM disabled")
4 # This file is included from other service-specific PAM config files,19 # failure tally and return failure status to PAM.
4 # This file is included from other service-specific PAM config files,15 # failure tally and return failure status to PAM.
1 SUMMARY = "NSS and PAM module for using LDAP as a naming service"3 daemon for NSS and PAM lookups using LDAP \
21 option('pam', type: 'boolean', value: false, description: 'Build PAM module')22 +option('pam-tests', type: 'boolean', value: true, description: 'Build PAM Tests')
16 3. Have applications use the PAM module to authenticate the user instead of20 13.19-13.33 inclusive for more details), new PAM module (e.g. pam-ipmi21 modules) has to be used along with regular PAM password hashing modules (e.g.87 || |PAM for user | | |Create new user| | | Redfish specific 1:1 | ||244 the password and set it through PAM | | …330 Applications must use `pam_authenticate()` API to authenticate user. Stacked PAM336 | Stacked PAM Authentication |360 Stacked PAM modules allow all 'ipmi' group user passwords to be stored in367 | Stacked PAM - Password |447 In OpenBMC, PAM based authentication is implemented, so for both LDAP users and[all …]
186 PAM, IRM, enumerator234 INTC_VECT(PAM, 0xec0), INTC_VECT(IRM, 0xee0),267 DU, GPIO3, GPIO2, GPIO1, GPIO0, PAM, 0, 0,302 { 0xfe410810, 0, 32, 4, /* INT2PRI4 */ { 0, 0, PAM, GPIO3,
2 # The PAM configuration file for the Shadow `passwd' service
1 # The PAM configuration file for the Shadow 'newusers' service