Home
last modified time | relevance | path

Searched refs:PAM (Results 1 – 25 of 88) sorted by relevance

1234

/openbmc/openbmc/poky/meta/recipes-extended/at/at/
H A Dconfigure-add-enable-pam.patch11 + [AS_HELP_STRING([--without-pam], [without PAM support])])
16 - AC_DEFINE(HAVE_PAM, 1, [Define to 1 for PAM support])
18 + AC_DEFINE(HAVE_PAM, 1, [Define to 1 for PAM support])],
20 + AC_MSG_ERROR([PAM selected but security/pam_misc.h not found])
/openbmc/openbmc/poky/meta/recipes-extended/shadow/files/
H A Dshadow-update-pam-conf.patch34 #%PAM-1.0
44 #%PAM-1.0
54 #%PAM-1.0
64 #%PAM-1.0
74 #%PAM-1.0
84 #%PAM-1.0
94 #%PAM-1.0
104 #%PAM-1.0
114 #%PAM-1.0
/openbmc/openbmc/poky/meta/recipes-core/dropbear/dropbear/
H A D0005-dropbear-enable-pam.patch28 /* Note: PAM auth is quite simple and only works for PAM modules which just do
31 * but there's an interface via a PAM module. It won't work for more complex
32 * PAM challenge/response.
33 * You can't enable both PASSWORD and PAM. */
H A Ddropbear1 #%PAM-1.0
/openbmc/openbmc/poky/meta/recipes-connectivity/openssh/openssh/
H A Dsshd_config63 # with some PAM modules and threads)
76 # Set this to 'yes' to enable PAM authentication, account processing,
77 # and session processing. If this is enabled, PAM authentication will
79 # PasswordAuthentication. Depending on your PAM configuration,
80 # PAM authentication via KbdInteractiveAuthentication may bypass
82 # If you just want the PAM account and session checks to run without
83 # PAM authentication, then enable this but set PasswordAuthentication
/openbmc/openbmc/poky/meta/recipes-extended/pam/
H A Dlibpam_1.7.0.bb2 SUMMARY = "Linux-PAM (Pluggable Authentication Modules)"
3 DESCRIPTION = "Linux-PAM (Pluggable Authentication Modules for Linux), a flexible mechanism for aut…
7 # PAM is dual licensed under GPL and BSD.
15 SRC_URI = "${GITHUB_BASE_URI}/download/v${PV}/Linux-PAM-${PV}.tar.xz \
34 S = "${WORKDIR}/Linux-PAM-${PV}"
50 FILES:${PN}-xtests = "${datadir}/Linux-PAM/xtests"
114 'PAM plugin for %s', hook=pam_plugin_hook, extra_depends='', prepend=True)
115 …do_split_packages(d, pam_filterdir, r'^(.*)$', 'pam-filter-%s', 'PAM filter for %s', extra_depends…
/openbmc/qemu/hw/pci-host/
H A DKconfig1 config PAM config
47 select PAM
56 select PAM
/openbmc/openbmc/meta-google/recipes-extended/pam/
H A Dlibpam_%.bbappend1 # Remove pwquality from PAM, to avoid breaking PAM and further dependencies
7 # Remove reference to pwquality library from PAM config file
/openbmc/openbmc/meta-phosphor/recipes-extended/pam/
H A Dpam-ipmi_git.bb1 SUMMARY = "PAM modules for IPMI support"
2 DESCRIPTION = "PAM modules managing password for IPMI"
/openbmc/openbmc/meta-security/recipes-security/google-authenticator-libpam/
H A Dgoogle-authenticator-libpam_1.09.bb1 SUMMARY = "Google Authenticator PAM module"
17 # Use the same dir location as PAM
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-extended/pam/
H A Dpam-radius_3.0.0.bb1 SUMMARY = "PAM module for RADIUS authentication"
2 DESCRIPTION = "This allows any PAM-capable machine to become a RADIUS client for \
/openbmc/openbmc/poky/meta/recipes-extended/cronie/cronie/
H A Dcrond_pam_config.patch4 Subject: [PATCH] cronie: enable PAM support for cronie
23 # Although no PAM authentication is called, auth modules
/openbmc/openbmc/poky/meta/recipes-extended/pam/libpam/pam.d/
H A Dother2 # /etc/pam.d/other - specify the PAM fallback behaviour
11 #specific PAM rules for the service and aid to debugging). Then to be
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-graphics/lxdm/lxdm/
H A D0003-check-for-libexecinfo-providing-backtrace-APIs.patch26 # Check for PAM support
27 AC_ARG_WITH(pam, AC_HELP_STRING([--with-pam],[Use PAM for authentication]),
/openbmc/openbmc/meta-openembedded/meta-networking/recipes-connectivity/samba/samba/
H A Dsamba-pam.patch30 "PAM support.");
33 + Logs.warn("PAM disabled")
/openbmc/openbmc/meta-ibm/recipes-extended/pam/libpam/pam.d/
H A Dcommon-auth4 # This file is included from other service-specific PAM config files,
19 # failure tally and return failure status to PAM.
/openbmc/openbmc/meta-phosphor/recipes-extended/pam/libpam/pam.d/
H A Dcommon-auth4 # This file is included from other service-specific PAM config files,
15 # failure tally and return failure status to PAM.
/openbmc/openbmc/meta-phosphor/recipes-support/nss-pam-ldapd/
H A Dnss-pam-ldapd_0.9.8.bb1 SUMMARY = "NSS and PAM module for using LDAP as a naming service"
3 daemon for NSS and PAM lookups using LDAP \
/openbmc/openbmc/poky/meta/recipes-gnome/libsecret/libsecret/
H A D0001-meson-add-option-to-disable-pam-tests.patch21 option('pam', type: 'boolean', value: false, description: 'Build PAM module')
22 +option('pam-tests', type: 'boolean', value: true, description: 'Build PAM Tests')
/openbmc/docs/architecture/
H A Duser-management.md16 3. Have applications use the PAM module to authenticate the user instead of
20 13.19-13.33 inclusive for more details), new PAM module (e.g. pam-ipmi
21 modules) has to be used along with regular PAM password hashing modules (e.g.
87 || |PAM for user | | |Create new user| | | Redfish specific 1:1 | ||
244 the password and set it through PAM | | …
330 Applications must use `pam_authenticate()` API to authenticate user. Stacked PAM
336 | Stacked PAM Authentication |
360 Stacked PAM modules allow all 'ipmi' group user passwords to be stored in
367 | Stacked PAM - Password |
447 In OpenBMC, PAM based authentication is implemented, so for both LDAP users and
[all …]
/openbmc/linux/arch/sh/kernel/cpu/sh4a/
H A Dsetup-shx3.c186 PAM, IRM, enumerator
234 INTC_VECT(PAM, 0xec0), INTC_VECT(IRM, 0xee0),
267 DU, GPIO3, GPIO2, GPIO1, GPIO0, PAM, 0, 0,
302 { 0xfe410810, 0, 32, 4, /* INT2PRI4 */ { 0, 0, PAM, GPIO3,
/openbmc/openbmc/poky/meta/recipes-extended/screen/screen/
H A Dscreen.pam1 #%PAM-1.0
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-dbs/postgresql/files/
H A Dpostgresql.pam1 #%PAM-1.0
/openbmc/openbmc/poky/meta/recipes-extended/shadow/files/pam.d/
H A Dpasswd2 # The PAM configuration file for the Shadow `passwd' service
H A Dnewusers1 # The PAM configuration file for the Shadow 'newusers' service

1234