1 .\"$Id: pwauth.8,v 1.8 2002/03/08 04:39:11 kloczek Exp $
2 .\" Copyright 1992, Julianne Frances Haugh
3 .\" All rights reserved.
5 .\" Redistribution and use in source and binary forms, with or without
6 .\" modification, are permitted provided that the following conditions
8 .\" 1. Redistributions of source code must retain the above copyright
9 .\" notice, this list of conditions and the following disclaimer.
10 .\" 2. Redistributions in binary form must reproduce the above copyright
11 .\" notice, this list of conditions and the following disclaimer in the
12 .\" documentation and/or other materials provided with the distribution.
13 .\" 3. Neither the name of Julianne F. Haugh nor the names of its contributors
14 .\" may be used to endorse or promote products derived from this software
15 .\" without specific prior written permission.
17 .\" THIS SOFTWARE IS PROVIDED BY JULIE HAUGH AND CONTRIBUTORS ``AS IS'' AND
18 .\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
19 .\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
20 .\" ARE DISCLAIMED. IN NO EVENT SHALL JULIE HAUGH OR CONTRIBUTORS BE LIABLE
21 .\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
22 .\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
23 .\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
24 .\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
25 .\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
26 .\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
29 .\" Japanese Version Copyright (c) 1997 Kazuyoshi Furutaka
30 .\" all rights reserved.
31 .\" Translated Fri Feb 14 23:06:00 JST 1997
32 .\" by Kazuyoshi Furutaka <furutaka@Flux.tokai.jaeri.go.jp>
33 .\" Modified Sun 22 Sep 2002 by NAKANO Takeo <nakano@apm.seikei.ac.jp>
36 .\"nakano ¿ʬ section 7 ¤Î¤Û¤¦¤¬Å¬Àڤʵ¤¤¬¤¹¤ë¡£
39 .\"O pwauth \- administrator defined password authentication
40 pwauth \- ´ÉÍý¼Ô¤¬ÀßÄꤹ¤ë¥Ñ¥¹¥ï¡¼¥Éǧ¾Ú
43 .\"O The system administrator is able to define a list of programs which
44 .\"O are used to validate a user's identity.
45 .\"O These programs are given in place of the encrypted password
46 .\"O information which is present in either the \fI/etc/passwd\fR or
47 .\"O \fI/etc/shadow\fR files.
48 .\"O The utilities which administer user accounts examine the encrypted
49 .\"O password field and determine if the user has an administrator defined
50 .\"O authentication program.
51 .\"O The \fBpw_auth\fR function will be invoked whenever one of these
52 .\"O administration programs determines that a user which is being altered
53 .\"O has authentication programs defined.
55 ¥æ¡¼¥¶¤Î¸Ä¿Íǧ¾Ú¤ËÍѤ¤¤é¤ì¤ë¥×¥í¥°¥é¥à¤Î¥ê¥¹¥È¤òÄêµÁ¤Ç¤¤ë¡£
57 \fI/etc/passwd\fR ¤â¤·¤¯¤Ï \fI/etc/shadow\fR
58 ¥Õ¥¡¥¤¥ëÃæ¤Ë¤¢¤ë¡¢°Å¹æ²½¤µ¤ì¤¿¥Ñ¥¹¥ï¡¼¥É¤ÎÂå¤ï¤ê¤Ë»ØÄꤹ¤ë¡£
59 ¥æ¡¼¥¶¥¢¥«¥¦¥ó¥È¤ò´ÉÍý¤¹¤ë¥æ¡¼¥Æ¥£¥ê¥Æ¥£¤Ï¡¢
60 °Å¹æ²½¥Ñ¥¹¥ï¡¼¥É¤Î¥Õ¥£¡¼¥ë¥É¤òÄ´¤Ù¡¢
61 ¤½¤Î¥æ¡¼¥¶¤ËÂФ·¤Æ¥·¥¹¥Æ¥à´ÉÍý¼Ô¤¬
62 ǧ¾Ú¥×¥í¥°¥é¥à¤òÀßÄꤷ¤Æ¤¤¤ë¤«¤É¤¦¤«È½ÃǤ¹¤ë¡£
63 ¤³¤ì¤é¤Î´ÉÍý¥×¥í¥°¥é¥à¤Î¤¤¤º¤ì¤«¤¬¡¢
64 Êѹ¹¤·¤è¤¦¤È¤·¤Æ¤¤¤ë¥æ¡¼¥¶¤Ëǧ¾Ú¥×¥í¥°¥é¥à¤¬ÀßÄꤵ¤ì¤Æ¤¤¤ë¤ÈȽÃǤ·¤¿¾ì¹ç¤Ï¡¢
65 ¾ï¤Ë \fBpw_auth\fR ´Ø¿ô¤¬¸Æ¤Ó½Ð¤µ¤ì¤ë¡£
67 .\"O The initial entry is created with the \fBuseradd\fR command.
68 .\"O Alterations, such as changing authentication information or deleting
69 .\"O the user account, will cause the \fBpw_auth\fR function to be invoked.
70 .\"O This keeps the authentication information up to date for each user
72 ºÇ½é¤Î¥¨¥ó¥È¥ê¤Ï \fBuseradd\fR ¥³¥Þ¥ó¥É¤Ë¤è¤êÀ¸À®¤µ¤ì¤ë¡£
73 ǧ¾Ú¾ðÊó¤ÎÊѹ¹¤ä¥æ¡¼¥¶¥¢¥«¥¦¥ó¥È¤Îºï½ü¤È¤¤¤Ã¤¿Êѹ¹¤¬È¯À¸¤¹¤ë¤È¡¢
74 \fBpw_auth\fR ´Ø¿ô¤¬¸Æ¤Ó½Ð¤µ¤ì¤ë¡£
75 ¤³¤Î´Ø¿ô¤Ï³Æ¥æ¡¼¥¶¥¢¥«¥¦¥ó¥È¤Îǧ¾Ú¾ðÊó¤òºÇ¿·¤ËÊݤġ£
77 .\"O The authentication programs do not create the actual login or network
79 .\"O The exit code from the authentication program is taken as an
80 .\"O indication that the action is to be permitted.
81 .\"O The calling process must have the appropriate priviledges to create
82 .\"O the login or network session itself.
83 ǧ¾Ú¥×¥í¥°¥é¥à¤Ï¼ÂºÝ¤Î¥í¥°¥¤¥ó¥»¥Ã¥·¥ç¥ó¤ä
84 ¥Í¥Ã¥È¥ï¡¼¥¯¥»¥Ã¥·¥ç¥ó¤ò³«»Ï¤·¤Ê¤¤¡£
85 ǧ¾Ú¥×¥í¥°¥é¥à¤«¤é¤Î½ªÎ»¥³¡¼¥É¤¬¡¢
86 ¤½¤Î½èÍý¤¬µö²Ä¤µ¤ì¤¿¤«¤É¤¦¤«¤ÎȽÃǤËÍѤ¤¤é¤ì¤ë¡£
87 ¸Æ¤Ó½Ð¤·¤¿¥×¥í¥»¥¹¤Ë¤Ï¡¢
88 ¥í¥°¥¤¥ó¥»¥Ã¥·¥ç¥ó¡¦¥Í¥Ã¥È¥ï¡¼¥¯¥»¥Ã¥·¥ç¥ó¤òÀ¸À®¤Ç¤¤ë¤À¤±¤Î¡¢
89 ŬÀÚ¤ÊÆø¢¤¬¤Ê¤±¤ì¤Ð¤Ê¤é¤Ê¤¤¡£
101 Julianne Frances Haugh (jockgrrl@ix.netcom.com)