diff options
Diffstat (limited to '')
-rw-r--r-- | debian/gdm3.gdm-fingerprint.pam | 25 |
1 files changed, 25 insertions, 0 deletions
diff --git a/debian/gdm3.gdm-fingerprint.pam b/debian/gdm3.gdm-fingerprint.pam new file mode 100644 index 0000000..5cd1b59 --- /dev/null +++ b/debian/gdm3.gdm-fingerprint.pam @@ -0,0 +1,25 @@ +#%PAM-1.0 +auth requisite pam_nologin.so +auth required pam_succeed_if.so user != root quiet_success +auth required pam_fprintd.so +auth optional pam_gnome_keyring.so +@include common-account +# SELinux needs to be the first session rule. This ensures that any +# lingering context has been cleared. Without this it is possible +# that a module could execute code in the wrong domain. +session [success=ok ignore=ignore module_unknown=ignore default=bad] pam_selinux.so close +session required pam_loginuid.so +# SELinux needs to intervene at login time to ensure that the process +# starts in the proper default security context. Only sessions which are +# intended to run in the user's context should be run after this. +# pam_selinux.so changes the SELinux context of the used TTY and configures +# SELinux in order to transition to the user context with the next execve() +# call. +session [success=ok ignore=ignore module_unknown=ignore default=bad] pam_selinux.so open +session optional pam_keyinit.so force revoke +session required pam_limits.so +session required pam_env.so readenv=1 +session required pam_env.so readenv=1 envfile=/etc/default/locale +@include common-session +session optional pam_gnome_keyring.so auto_start +password required pam_fprintd.so |