blob: 9a91ad852fbd7018c79d117a46f949abe86d6e90 [file] [log] [blame]
paul788cdc62003-01-18 00:22:08 +00001#%PAM-1.0
2#
pauledd7c242003-06-04 13:59:38 +00003
paul5f5eab72003-08-12 12:56:00 +00004##### if running quagga as root:
paul788cdc62003-01-18 00:22:08 +00005# Only allow root (and possibly wheel) to use this because enable access
6# is unrestricted.
paul85706762005-11-04 12:25:23 +00007auth sufficient pam_rootok.so
paul788cdc62003-01-18 00:22:08 +00008
paul788cdc62003-01-18 00:22:08 +00009# Uncomment the following line to implicitly trust users in the "wheel" group.
paul85706762005-11-04 12:25:23 +000010#auth sufficient pam_wheel.so trust use_uid
paul788cdc62003-01-18 00:22:08 +000011# Uncomment the following line to require a user to be in the "wheel" group.
paul85706762005-11-04 12:25:23 +000012#auth required pam_wheel.so use_uid
pauledd7c242003-06-04 13:59:38 +000013###########################################################
14
paul5f5eab72003-08-12 12:56:00 +000015# If using quagga privileges and with a seperate group for vty access, then
pauledd7c242003-06-04 13:59:38 +000016# access can be controlled via the vty access group, and pam can simply
paul2f4453f2003-08-13 06:05:01 +000017# check for valid user/password, eg:
pauledd7c242003-06-04 13:59:38 +000018#
19# only allow local users.
paul85706762005-11-04 12:25:23 +000020#auth required pam_securetty.so
21#auth include system-auth
22#auth required pam_nologin.so
23#account include system-auth
24#password include system-auth
25#session include system-auth
26#session optional pam_console.so