Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- /bin/cat<<EOPPA>/etc/pam.d/password-auth
- #%PAM-1.0
- # This file is auto-generated.
- # User changes will be destroyed the next time authconfig is run.
- auth required pam_env.so
- auth sufficient pam_unix.so likeauth nullok
- auth sufficient pam_ldap.so use_first_pass
- auth requisite pam_succeed_if.so uid >= 500 quiet
- auth required pam_deny.so
- account required pam_unix.so
- account sufficient pam_localuser.so
- account sufficient pam_succeed_if.so uid < 500 quiet
- account required pam_permit.so
- password requisite pam_cracklib.so try_first_pass retry=3 type=
- password sufficient pam_unix.so md5 shadow nullok try_first_pass use_authtok
- password required pam_deny.so
- session optional pam_keyinit.so revoke
- session required pam_limits.so
- -session optional pam_systemd.so
- session [success=1 default=ignore] pam_succeed_if.so service in crond quiet use_uid
- session required pam_unix.so
- EOPPA
- /bin/cat<<EOPSA>/etc/pam.d/system-auth
- #%PAM-1.0
- # This file is auto-generated.
- # User changes will be destroyed the next time authconfig is run.
- auth required pam_env.so
- auth sufficient pam_unix.so likeauth nullok
- auth sufficient pam_ldap.so use_first_pass
- auth required pam_deny.so
- account required pam_unix.so
- account sufficient pam_localuser.so
- account sufficient pam_succeed_if.so uid < 500 quiet
- account required pam_permit.so
- password requisite pam_cracklib.so try_first_pass retry=3 type=
- password sufficient pam_unix.so md5 shadow nullok try_first_pass use_authtok
- password required pam_deny.so
- session optional pam_keyinit.so revoke
- session required pam_limits.so
- -session optional pam_systemd.so
- session [success=1 default=ignore] pam_succeed_if.so service in crond quiet use_uid
- session required pam_unix.so
- EOPSA
Add Comment
Please, Sign In to add comment