Man page - pam_sepermit(8)
Packages contas this manual
- pam_warn(8)
- pam_nologin(8)
- unix_chkpwd(8)
- sepermit.conf(5)
- pam_loginuid(8)
- pam_mail(8)
- limits.conf(5)
- faillock(8)
- pwhistory_helper(8)
- pam_mkhomedir(8)
- pam.d(5)
- pam_limits(8)
- pam_rhosts(8)
- pam_localuser(8)
- pam_stress(8)
- pam_group(8)
- pam_sepermit(8)
- namespace.conf(5)
- access.conf(5)
- environment(5)
- pam_setquota(8)
- pam_listfile(8)
- pam-auth-update(8)
- pam_selinux(8)
- pam_unix(8)
- pam_issue(8)
- pam_pwhistory(8)
- pam_filter(8)
- pam_echo(8)
- pam_faillock(8)
- pam_motd(8)
- pam_getenv(8)
- pam_faildelay(8)
- mkhomedir_helper(8)
- pam_permit(8)
- pam_env.conf(5)
- pam_exec(8)
- pam_access(8)
- pam_xauth(8)
- pam_time(8)
- pam_wheel(8)
- pam(7)
- pam_env(8)
- pam_umask(8)
- pam_usertype(8)
- pam_namespace_helper(8)
- pam_timestamp(8)
- pam_rootok(8)
- group.conf(5)
- pam_securetty(8)
- faillock.conf(5)
- pam_userdb(8)
- pam_keyinit(8)
- pwhistory.conf(5)
- pam.conf(5)
- pam_canonicalize_user(8)
- time.conf(5)
- pam_tty_audit(8)
- pam_debug(8)
- pam_shells(8)
- pam_ftp(8)
- pam_deny(8)
- pam_namespace(8)
- pam_timestamp_check(8)
- unix_update(8)
- pam_succeed_if(8)
apt-get install libpam-runtime
Manual
| PAM_SEPERMIT(8) | Linux-PAM Manual | PAM_SEPERMIT(8) |
NAME
pam_sepermit - PAM module to allow/deny login depending on SELinux enforcement state
SYNOPSIS
pam_sepermit.so [debug] [conf=/path/to/config/file]
DESCRIPTION
The pam_sepermit module allows or denies login depending on SELinux enforcement state.
When the users which are logging in match an entry in the config file they are allowed access only when SELinux is in enforcing mode. Otherwise they are denied access. For users not matching any entry in the config file the pam_sepermit module returns PAM_IGNORE return value.
The config file contains a list of user names one per line with optional arguments. If the name is prefixed with @ character it means that all users in the group name match. If it is prefixed with a % character the SELinux user is used to match against the name instead of the account name. Note that when SELinux is disabled the SELinux user assigned to the account cannot be determined. This means that such entries are never matched when SELinux is disabled and pam_sepermit will return PAM_IGNORE.
See sepermit.conf(5) for details.
OPTIONS
debug
conf=/path/to/config/file
MODULE TYPES PROVIDED
The auth and account module types are provided.
RETURN VALUES
PAM_AUTH_ERR
PAM_SUCCESS
PAM_IGNORE
PAM_USER_UNKNOWN
PAM_SERVICE_ERR
FILES
/etc/security/sepermit.conf
EXAMPLES
auth [success=done ignore=ignore default=bad] pam_sepermit.so auth required pam_unix.so account required pam_unix.so session required pam_permit.so
SEE ALSO
sepermit.conf(5), pam.conf(5), pam.d(5), pam(7) selinux(8)
AUTHOR
pam_sepermit and this manual page were written by Tomas Mraz <tmraz@redhat.com>.
| 06/29/2025 | Linux-PAM |