1 # PAM configuration for the Secure Shell service
3 # If they're not root, but their user exists (success),
4 auth [success=ignore ignore=ignore default=1 module_unknown=die] pam_succeed_if.so uid > 0
5 # print the "You don't have tickets" error:
6 auth [success=die ignore=reset default=die module_unknown=die] pam_echo.so file=/etc/issue.net.no_tkt
8 auth [success=1 ignore=ignore default=ignore module_unknown=die] pam_succeed_if.so uid eq 0
9 # print the "your account doesn't exist" error:
10 auth [success=die ignore=reset default=die module_unknown=die] pam_echo.so file=/etc/issue.net.no_user
12 # Read environment variables from /etc/environment and
13 # /etc/security/pam_env.conf.
14 auth required pam_env.so # [1]
15 # In Debian 4.0 (etch), locale-related environment variables were moved to
16 # /etc/default/locale, so read that as well.
17 auth required pam_env.so envfile=/etc/default/locale
19 # Standard Un*x authentication.
22 # Disallow non-root logins when /etc/nologin exists.
23 account required pam_nologin.so
25 # Uncomment and edit /etc/security/access.conf if you need to set complex
26 # access limits that are hard to express in sshd_config.
27 # account required pam_access.so
29 # Standard Un*x authorization.
30 @include common-account
32 # Standard Un*x session setup and teardown.
33 @include common-session
35 # Print the message of the day upon successful login.
36 session optional pam_motd.so # [1]
38 # Print the status of the user's mailbox upon successful login.
39 session optional pam_mail.so standard noenv # [1]
41 # Set up user limits from /etc/security/limits.conf.
42 session required pam_limits.so
44 # Set up SELinux capabilities (need modified pam)
45 # session required pam_selinux.so multiple
47 # Standard Un*x password updating.
48 @include common-password