Windows PowerShell command on Get-command pam_sm_acct_mgmt
MyWebUniversity

Manual Pages for UNIX Operating System command usage for man pam_sm_acct_mgmt

PAM Library Functions pam_sm_acct_mgmt(3PAM)

NAME

pam_sm_acct_mgmt - service provider implementation for

pam_acct_mgmt

SYNOPSIS

cc [ flag ... ] file ... -lpam [ library ... ]

#include

#include

int pam_sm_acct_mgmt(pam_handle_t *pamh, int flags, int argc,

const char **argv);

DESCRIPTION

In response to a call to pam_acct_mgmt(3PAM), the PAM

framework calls pam_sm_acct_mgmt() from the modules listed

in the pam.conf(4) file. The account management provider

supplies the back-end functionality for this interface func-

tion. Applications should not call this API directly.

The pam_sm_acct_mgmt() function determines whether or not

the current user's account and password are valid. This includes checking for password and account expiration, and valid login times. The user in question is specified by a

prior call to pam_start(), and is referenced by the authen-

tication handle, pamh, which is passed as the first argument

to pam_sm_acct_mgmt(). The following flags may be set in the

flags field:

PAM_SILENT The account management service

should not generate any mes-

sages.

PAM_DISALLOW_NULL_AUTHTOK The account management service

should return

PAM_NEW_AUTHTOK_REQD if the

user has a null authentication token. The argc argument represents the number of module options passed in from the configuration file pam.conf(4). argv

specifies the module options, which are interpreted and pro-

cessed by the account management service. Please refer to the specific module man pages for the various available options. If an unknown option is passed to the module, an error should be logged through syslog(3C) and the option ignored.

SunOS 5.11 Last change: 18 Nov 2003 1

PAM Library Functions pam_sm_acct_mgmt(3PAM)

If an account management module determines that the user

password has aged or expired, it should save this informa-

tion as state in the authentication handle, pamh, using

pam_set_data(). pam_chauthok() uses this information to

determine which passwords have expired.

RETURN VALUES

If there are no restrictions to logging in, PAM_SUCCESS is

returned. The following error values may also be returned upon error:

PAM_USER_UNKNOWN User not known to underlying authen-

tication module.

PAM_NEW_AUTHTOK_REQD New authentication token required.

PAM_ACCT_EXPIRED User account has expired.

PAM_PERM_DENIED User denied access to account at

this time.

PAM_IGNORE Ignore underlying account module

regardless of whether the control

flag is required, optional or suffi-

cient.

ATTRIBUTES

See attributes(5) for description of the following attri-

butes:

____________________________________________________________

| ATTRIBUTE TYPE | ATTRIBUTE VALUE |

|_____________________________|_____________________________|

| Interface Stability | Committed |

|_____________________________|_____________________________|

| MT-Level | MT-Safe with exceptions |

|_____________________________|_____________________________|

SEE ALSO

pam(3PAM), pam_acct_mgmt(3PAM), pam_set_data(3PAM),

pam_start(3PAM), syslog(3C), libpam(3LIB), pam.conf(4),

attributes(5)

SunOS 5.11 Last change: 18 Nov 2003 2

PAM Library Functions pam_sm_acct_mgmt(3PAM)

NOTES

The interfaces in libpam are MT-Safe only if each thread

within the multithreaded application uses its own PAM han-

dle.

If the PAM_REPOSITORY item_type is set and a service module

does not recognize the type, the service module does not

process any information, and returns PAM_IGNORE. If the

PAM_REPOSITORY item_type is not set, a service module per-

forms its default action.

SunOS 5.11 Last change: 18 Nov 2003 3




Contact us      |      About us      |      Term of use      |       Copyright © 2000-2019 MyWebUniversity.com ™