1pam_smb_passwd(5)     Standards, Environments, and Macros    pam_smb_passwd(5)
2
3
4

NAME

6       pam_smb_passwd - SMB password management module
7

SYNOPSIS

9       pam_smb_passwd.so.1
10
11

DESCRIPTION

13       The  pam_smb_passwd  module enhances the PAM password management stack.
14       This functionality supports the changing or adding of SMB passwords for
15       local  Solaris  users.  The  Solaris  CIFS server uses SMB passwords to
16       authenticate  connected  Solaris  users.  This  module   includes   the
17       pam_sm_chauthtok(3PAM) function.
18
19
20       The pam_sm_chauthtok() function accepts the following flags:
21
22       PAM_PRELIM_CHECK
23
24           Always returns PAM_IGNORE.
25
26
27       PAM_SILENT
28
29           Suppresses messages.
30
31
32       PAM_UPDATE_AUTHTOK
33
34           Updates  or creates a new CIFS local LM/NTLM hash for the user that
35           is specified in PAM_USER by using  the  authentication  information
36           found   in  PAM_AUTHTOK.  The  LM  hash  is  only  created  if  the
37           smbd/lmauth_level property value of the smb/server service  is  set
38           to  3  or  less.  PAM_IGNORE  is returned if the user is not in the
39           local /etc/passwd repository.
40
41
42
43       The following options can be passed to the pam_smb_passwd module:
44
45       debug
46
47           Produces  syslog(3C)  debugging  information  at  the  LOG_AUTH  or
48           LOG_DEBUG level.
49
50
51       nowarn
52
53           Suppresses warning messages.
54
55

FILES

57       /var/smb/smbpasswd
58
59           Stores SMB passwords for Solaris users.
60
61

ERRORS

63       Upon   successful  completion  of  pam_sm_chauthtok(),  PAM_SUCCESS  is
64       returned. The following error codes are returned upon error:
65
66       PAM_AUTHTOK_ERR
67
68           Authentication token manipulation error
69
70
71       PAM_AUTHTOK_LOCK_BUSY
72
73           SMB password file is locked
74
75
76       PAM_PERM_DENIED
77
78           Permissions are insufficient for accessing the SMB password file
79
80
81       PAM_SYSTEM_ERR
82
83           System error
84
85
86       PAM_USER_UNKNOWN
87
88           User is unknown
89
90

ATTRIBUTES

92       See the attributes(5)  man  page  for  descriptions  of  the  following
93       attributes:
94
95
96
97
98       ┌─────────────────────────────┬─────────────────────────────┐
99       │      ATTRIBUTE TYPE         │      ATTRIBUTE VALUE        │
100       ├─────────────────────────────┼─────────────────────────────┤
101       │Interface Stability          │Committed                    │
102       ├─────────────────────────────┼─────────────────────────────┤
103       │MT Level                     │MT-Safe with exceptions      │
104       └─────────────────────────────┴─────────────────────────────┘
105

SEE ALSO

107       smbd(1M),  syslog(3C),  libpam(3LIB),  pam(3PAM),  pam_chauthtok(3PAM),
108       pam_sm(3PAM), pam_sm_chauthtok(3PAM), pam.conf(4), attributes(5)
109

NOTES

111       The interfaces in libpam(3LIB) are MT-Safe only if each  thread  within
112       the multi-threaded application uses its own PAM handle.
113
114
115       The pam_smb_passwd.so.1 module should be stacked following all password
116       qualification modules in the PAM password stack.
117
118
119
120SunOS 5.11                        29 Apr 2008                pam_smb_passwd(5)
Impressum