switchkiller / pam-face-authentication

Automatically exported from code.google.com/p/pam-face-authentication
0 stars 0 forks source link

Disabling face recognition for a single session in GDM #51

Open GoogleCodeExporter opened 9 years ago

GoogleCodeExporter commented 9 years ago
Is there a way to disable/bypass face recognition and use traditional password 
method during the GDM login screen? 

Original issue reported on code.google.com by arunson...@gmail.com on 28 Sep 2010 at 9:22

GoogleCodeExporter commented 9 years ago
how ???????????????????'  help me please!!!!!!!!!!!

Original comment by aldoba...@gmail.com on 26 Oct 2010 at 3:26

GoogleCodeExporter commented 9 years ago
could you paste your /etc/pam.d/common-auth
and /etc/pam.d/gdm

Original comment by rohan.a...@gmail.com on 26 Oct 2010 at 3:36

GoogleCodeExporter commented 9 years ago
Here they are:

/etc/pam.d/common-auth
--------------------------------------------------------------------------------
---
#
# /etc/pam.d/common-auth - authentication settings common to all services
#
# This file is included from other service-specific PAM config files,
# and should contain a list of the authentication modules that define
# the central authentication scheme for use on the system
# (e.g., /etc/shadow, LDAP, Kerberos, etc.).  The default is to use the
# traditional Unix authentication mechanisms.
#
# As of pam 1.0.1-6, this file is managed by pam-auth-update by default.
# To take advantage of this, it is recommended that you configure any
# local modules either before or after the default block, and use
# pam-auth-update to manage selection of other modules.  See
# pam-auth-update(8) for details.

# here are the per-package modules (the "Primary" block)
auth    [success=2 default=ignore]  pam_unix.so nullok_secure
auth    [success=1 default=ignore]  pam_winbind.so krb5_auth krb5_ccache_type=FILE 
cached_login try_first_pass
# here's the fallback if no module succeeds
auth    requisite           pam_deny.so
# prime the stack with a positive return value if there isn't one already;
# this avoids us returning an error just because nothing sets a success code
# since the modules above will each just jump around
auth    required            pam_permit.so
# and here are more per-package modules (the "Additional" block)
auth    optional            pam_smbpass.so migrate
# end of pam-auth-update config

--------------------------------------------------------------------------------
----

/etc/pam.d/gdm
--------------------------------------------------------------------------------
----
auth sufficient pam_face_authentication.so enableX
#%PAM-1.0
auth    requisite       pam_nologin.so
auth    required        pam_env.so readenv=1
auth    required        pam_env.so readenv=1 envfile=/etc/default/locale
auth    sufficient      pam_succeed_if.so user ingroup nopasswdlogin
@include common-auth
auth    optional        pam_gnome_keyring.so
@include common-account
session [success=ok ignore=ignore module_unknown=ignore default=bad] 
pam_selinux.so close
session required        pam_limits.so
@include common-session
session [success=ok ignore=ignore module_unknown=ignore default=bad] 
pam_selinux.so open
session optional        pam_gnome_keyring.so auto_start
@include common-password
--------------------------------------------------------------------------------
-----

Original comment by arunson...@gmail.com on 28 Oct 2010 at 3:35