A Pluggable Authentication Module (PAM) which allows the establishment of alternate passwords that can be used to perform actions to clear sensitive data, notify IT/Security staff, close off sensitive network connections, etc if a user is coerced into giving a threat actor a password.
GNU Lesser General Public License v3.0
1.33k
stars
39
forks
source link
[#35] Update Documentation example to indicate #!/bin/sh in hello.sh #36
Summary: Specified hello.sh is a shell script in the content of the script so that the system will execute as a shell script rather than an executable
Issue: #35
Tested changes:
$ sudo pam_test $USER
Credentials accepted.
Password:
Hello World
Account is valid.
Authenticated
Context: Ran a fresh install of Ubuntu 22.04 and encountered an error where shell script was not running based on following the examples in the documentation. Wrote a simple script to verify the behavior and realized I needed to added #!/bin/sh to resolve exec format error
Summary: Specified
hello.sh
is a shell script in the content of the script so that the system will execute as a shell script rather than an executable Issue: #35 Tested changes:Context: Ran a fresh install of Ubuntu 22.04 and encountered an error where shell script was not running based on following the examples in the documentation. Wrote a simple script to verify the behavior and realized I needed to added
#!/bin/sh
to resolveexec format
error