pam_sepermit.so
[
debug
] [
conf=/path/to/config/file
]
The pam_sepermit module allows or denies login depending on SELinux enforcement state.
When the users which are logging in match an entry in the config file they are allowed access only when SELinux is in enforcing mode. Otherwise they are denied access. For users not matching any entry in the config file the pam_sepermit module returns PAM_IGNORE return value.
The config file contains a list of user names one per line with optional arguments. If the
name
is prefixed with @ character it means that all
users in the group name
match. If it is prefixed
with a % character the SELinux user is used to match against the name
instead of the account name. Note that when SELinux is disabled the
SELinux user assigned to the account cannot be determined. This means that
such entries are never matched when SELinux is disabled and pam_sepermit
will return PAM_IGNORE.
See sepermit.conf(5) for details.
If there is no explicitly specified configuration file and
/etc/security/sepermit.conf
does not exist,
%vendordir%/security/sepermit.conf
is used.
Turns on debugging via syslog(3).
Path to alternative config file overriding the default.
SELinux is disabled or in the permissive mode and the user matches.
SELinux is in the enforcing mode and the user matches.
The user does not match any entry in the config file.
The module was unable to determine the user's name.
Error during reading or parsing the config file.
auth [success=done ignore=ignore default=bad] pam_sepermit.so auth required pam_unix.so account required pam_unix.so session required pam_permit.so