pam_sm_authenticate man page on SmartOS

Man page or keyword search:  
man Server   16655 pages
apropos Keyword Search (all sections)
Output format
SmartOS logo
[printable version]

PAM_SM_AUTHENTICATE(3PAM)			     PAM_SM_AUTHENTICATE(3PAM)

NAME
       pam_sm_authenticate - service provider implementation for pam_authenti‐
       cate

SYNOPSIS
       cc [ flag... ] file... -lpam [ library... ]
       #include <security/pam_appl.h>
       #include <security/pam_modules.h>

       int pam_sm_authenticate(pam_handle_t *pamh, int flags,
	    int argc, const char **argv);

DESCRIPTION
       In response to a call to	 pam_authenticate(3PAM),  the	PAM  framework
       calls  pam_sm_authenticate() from the modules listed in the pam.conf(4)
       file. The authentication provider supplies the  back-end	 functionality
       for this interface function.

       The  pam_sm_authenticate() function is called to verify the identity of
       the current user. The user is usually required to enter a  password  or
       similar	authentication	token depending upon the authentication scheme
       configured within the system. The user in question is  specified	 by  a
       prior call to pam_start(), and is referenced by the authentication han‐
       dle pamh.

       If the user is unknown to the authentication service, the service  mod‐
       ule  should mask this error and continue to prompt the user for a pass‐
       word. It should then return the error, PAM_USER_UNKNOWN.

       The following flag may be passed in to pam_sm_authenticate():

       PAM_SILENT
				    The authentication service should not gen‐
				    erate any messages.

       PAM_DISALLOW_NULL_AUTHTOK
				    The authentication service should return

       PAM_AUTH_ERR
				    The user has a null authentication token.

       The  argc  argument  represents	the number of module options passed in
       from the configuration file  pam.conf(4).  argv	specifies  the	module
       options, which are interpreted and processed by the authentication ser‐
       vice.  Please refer to the specific module man pages  for  the  various
       available  options.  If	any  unknown  option  is passed in, the module
       should log the error and ignore the option.

       Before returning, pam_sm_authenticate() should call pam_get_item()  and
       retrieve	 PAM_AUTHTOK.  If  it has not been set before and the value is
       NULL, pam_sm_authenticate() should set it to the	 password  entered  by
       the user using pam_set_item().

       An authentication module may save the authentication status (success or
       reason for  failure)  as	 state	in  the	 authentication	 handle	 using
       pam_set_data(3PAM).  This  information  is intended for use by pam_set‐
       cred().

RETURN VALUES
       Upon successful completion,  PAM_SUCCESS must be returned. In addition,
       the following values may be returned:

       PAM_MAXTRIES
				Maximum	  number  of  authentication  attempts
				exceeded.

       PAM_AUTH_ERR
				Authentication failure.

       PAM_CRED_INSUFFICIENT
				Cannot	access	authentication	data  due   to
				insufficient credentials.

       PAM_AUTHINFO_UNAVAIL
				Underlying   authentication  service  can  not
				retrieve authentication information.

       PAM_USER_UNKNOWN
				User not known	to  underlying	authentication
				module.

       PAM_IGNORE
				Ignore	  underlying   authentication	module
				regardless of  whether	the  control  flag  is
				required,optional, or sufficient1.

ATTRIBUTES
       See attributes(5) for description of the following attributes:

       ┌────────────────────┬─────────────────────────┐
       │  ATTRIBUTE TYPE    │	  ATTRIBUTE VALUE     │
       ├────────────────────┼─────────────────────────┤
       │Interface Stability │  Stable		      │
       ├────────────────────┼─────────────────────────┤
       │MT-Level	    │ MT-Safe with exceptions │
       └────────────────────┴─────────────────────────┘

SEE ALSO
       pam(3PAM),	   pam_authenticate(3PAM),	   pam_get_item(3PAM),
       pam_set_data(3PAM),	 pam_set_item(3PAM),	    pam_setcred(3PAM),
       pam_start(3PAM), libpam(3LIB), pam.conf(4), attributes(5)

NOTES
       Modules	should not retry the authentication in the event of a failure.
       Applications handle  authentication  retries  and  maintain  the	 retry
       count. To limit the number of retries, the module can return a PAM_MAX‐
       TRIES error.

       The interfaces in  libpam are MT-Safe only if each  thread  within  the
       multithreaded application uses its own  PAM handle.

       If  the	PAM_REPOSITORY	item_type is set and a service module does not
       recognize the type, the service module does not	process	 any  informa‐
       tion,  and  returns  PAM_IGNORE. If the PAM_REPOSITORY item_type is not
       set, a service module performs its default action.

				 Jan 27, 2005	     PAM_SM_AUTHENTICATE(3PAM)
[top]

List of man pages available for SmartOS

Copyright (c) for man pages and the logo by the respective OS vendor.

For those who want to learn more, the polarhome community provides shell access and support.

[legal] [privacy] [GNU] [policy] [cookies] [netiquette] [sponsors] [FAQ]
Tweet
Polarhome, production since 1999.
Member of Polarhome portal.
Based on Fawad Halim's script.
....................................................................
Vote for polarhome
Free Shell Accounts :: the biggest list on the net