runs
#%PAM-1.0
auth include config-util
account include config-util
session include config-util
This includes
#%PAM-1.0
auth sufficient pam_rootok.so
auth sufficient pam_timestamp.so
auth include system-auth
account required pam_permit.so
session required pam_permit.so
session optional pam_xauth.so
session optional pam_timestamp.so
The auth configuration will succeed if the current user is
The timestamp file that
Once the authentication has succeeded,
USER=root
PROGRAM=/usr/sbin/system-config-network
SESSION=true
This instructs
You can adjust the PAM configuration to suit your needs. For example, to allow regular users to run
#%PAM-1.0
auth sufficient pam_permit.so
account include config-util
session include config-util
It's often convenient to enable the console userthe person physically logged on to the system keyboard and displayto run any of the programs controlled by
#%PAM-1.0
auth sufficient pam_rootok.so
auth sufficient pam_timestamp.so
auth sufficient pam_console.so
auth include system-auth
account required pam_permit.so
session required pam_permit.so
session optional pam_xauth.so
session optional pam_timestamp.so
This will permit the current console owner to execute the configuration tools regardless of where he is executing them. For example, if the user
8.6.2. How Does It Work?
PAM is simply a group of libraries used by applications. Each PAM-aware application uses those libraries to perform authentication, account control, the management of passwords (or other tokens), and session setup.
Each PAM module is a shared object (
8.6.3. What About...
8.6.3.1. ...other PAM modules?
There are many PAM modules included in Fedora Core. For documentation, refer to the PAM Administrator's manual in
There are also a number of PAM modules available on the Internet and from hardware vendors, designed to support authentication using biometric devices, smart tokens, and more.
8.6.3.2. ...permitting the console user to use su without a password?
Edit
#%PAM-1.0
auth sufficient pam_rootok.so