chsh 0000644 00000000526 15053274477 0005435 0 ustar 00 #%PAM-1.0
auth sufficient pam_rootok.so
auth include system-auth
account required pam_succeed_if.so shell != /usr/local/cpanel/bin/noshell
account required pam_succeed_if.so shell != /usr/local/cpanel/bin/jailshell
account include system-auth
password include system-auth
session include system-auth
login 0000644 00000001313 15053274477 0005613 0 ustar 00 #%PAM-1.0
auth substack system-auth
auth include postlogin
account required pam_nologin.so
account include system-auth
password include system-auth
# pam_selinux.so close should be the first session rule
session required pam_selinux.so close
session required pam_loginuid.so
session optional pam_console.so
# pam_selinux.so open should only be followed by sessions to be executed in the user context
session required pam_selinux.so open
session required pam_namespace.so
session optional pam_keyinit.so force revoke
session include system-auth
session include postlogin
-session optional pam_ck_connector.so
chfn 0000644 00000000526 15053274477 0005426 0 ustar 00 #%PAM-1.0
auth sufficient pam_rootok.so
auth include system-auth
account required pam_succeed_if.so shell != /usr/local/cpanel/bin/noshell
account required pam_succeed_if.so shell != /usr/local/cpanel/bin/jailshell
account include system-auth
password include system-auth
session include system-auth
password-auth 0000644 00000001422 15053274477 0007305 0 ustar 00 #%PAM-1.0
# This file is auto-generated.
# User changes will be destroyed the next time authselect is run.
auth required pam_env.so
auth required pam_hulk.so
auth sufficient pam_unix.so try_first_pass nullok
auth required pam_deny.so
account required pam_unix.so
password requisite pam_pwquality.so try_first_pass local_users_only retry=3 authtok_type=
password sufficient pam_unix.so try_first_pass use_authtok nullok sha512 shadow
password required pam_deny.so
session optional pam_keyinit.so revoke
session required pam_limits.so
-session optional pam_systemd.so
session [success=1 default=ignore] pam_succeed_if.so service in crond quiet use_uid
session required pam_unix.so
remote 0000644 00000001200 15053274477 0005771 0 ustar 00 #%PAM-1.0
auth substack password-auth
auth include postlogin
account required pam_nologin.so
account include password-auth
password include password-auth
# pam_selinux.so close should be the first session rule
session required pam_selinux.so close
session required pam_loginuid.so
# pam_selinux.so open should only be followed by sessions to be executed in the user context
session required pam_selinux.so open
session required pam_namespace.so
session optional pam_keyinit.so force revoke
session include password-auth
session include postlogin
other 0000644 00000000232 15053274477 0005623 0 ustar 00 #%PAM-1.0
auth required pam_deny.so
account required pam_deny.so
password required pam_deny.so
session required pam_deny.so
runuser-l 0000644 00000000212 15053274477 0006434 0 ustar 00 #%PAM-1.0
auth include runuser
session optional pam_keyinit.so force revoke
-session optional pam_systemd.so
session include runuser
postlogin 0000644 00000000616 15053274477 0006526 0 ustar 00 #%PAM-1.0
# This file is auto-generated.
# User changes will be destroyed the next time authselect is run.
session optional pam_umask.so silent
session [success=1 default=ignore] pam_succeed_if.so service !~ gdm* service !~ su* quiet
session [default=1] pam_lastlog.so nowtmp showfailed
session optional pam_lastlog.so silent noupdate showfailed
config-util 0000644 00000000350 15053274477 0006723 0 ustar 00 #%PAM-1.0
auth sufficient pam_rootok.so
auth sufficient pam_timestamp.so
auth include system-auth
account required pam_permit.so
session required pam_permit.so
session optional pam_xauth.so
session optional pam_timestamp.so
system-auth 0000644 00000001422 15053274477 0006767 0 ustar 00 #%PAM-1.0
# This file is auto-generated.
# User changes will be destroyed the next time authselect is run.
auth required pam_env.so
auth required pam_hulk.so
auth sufficient pam_unix.so try_first_pass nullok
auth required pam_deny.so
account required pam_unix.so
password requisite pam_pwquality.so try_first_pass local_users_only retry=3 authtok_type=
password sufficient pam_unix.so try_first_pass use_authtok nullok sha512 shadow
password required pam_deny.so
session optional pam_keyinit.so revoke
session required pam_limits.so
-session optional pam_systemd.so
session [success=1 default=ignore] pam_succeed_if.so service in crond quiet use_uid
session required pam_unix.so
runuser 0000644 00000000217 15053274477 0006210 0 ustar 00 #%PAM-1.0
auth sufficient pam_rootok.so
session optional pam_keyinit.so revoke
session required pam_limits.so
session required pam_unix.so
su-l 0000644 00000000211 15053274477 0005357 0 ustar 00 #%PAM-1.0
auth include su
account include su
password include su
session optional pam_keyinit.so force revoke
session include su
su 0000644 00000001221 15053274477 0005130 0 ustar 00 #%PAM-1.0
auth required pam_env.so
auth sufficient pam_rootok.so
# Uncomment the following line to implicitly trust users in the "wheel" group.
#auth sufficient pam_wheel.so trust use_uid
# Uncomment the following line to require a user to be in the "wheel" group.
#auth required pam_wheel.so use_uid
auth substack system-auth
auth include postlogin
account sufficient pam_succeed_if.so uid = 0 use_uid quiet
account include system-auth
password include system-auth
session include system-auth
session include postlogin
session optional pam_xauth.so
session required pam_sulve.so
session required pam_lve.so 500 1
smartcard-auth 0000644 00000000231 15053274477 0007420 0 ustar 00 #%PAM-1.0
# This file is auto-generated.
# User changes will be destroyed the next time authselect is run.
auth sufficient pam_sss.so allow_missing_name
fingerprint-auth 0000644 00000001275 15053274477 0010000 0 ustar 00 #%PAM-1.0
# This file is auto-generated.
# User changes will be destroyed the next time authselect is run.
auth required pam_env.so
auth sufficient pam_fprintd.so
auth required pam_deny.so
account required pam_unix.so
account sufficient pam_localuser.so
account sufficient pam_succeed_if.so uid < 500 quiet
account required pam_permit.so
password required pam_deny.so
session optional pam_keyinit.so revoke
session required pam_limits.so
-session optional pam_systemd.so
session [success=1 default=ignore] pam_succeed_if.so service in crond quiet use_uid
session required pam_unix.so