The prompt you mention works for files installed directly from the package by apt-get or dpkg. Instead they are installed by a post install script. Frederik Nielsen Frederik Nielsen 3, 3 3 gold badges 28 28 silver badges 45 45 bronze badges. I thought about this solution but I don't want to change the PAM configuration before reviewing changes; I'm looking for a mean to inspect the changes without changing the behavior of the system.
I can follow you on this one but I can't seem to think of any other way to do it. A less interruptive way would be to make a script that first makes a backup, overwrites the old ones and copying them to another place before restoring the original ones back to where they should be.
This process should limit the amount of time the PAM configuration is changed. The thing is, I assume pam-auth-update has to get its new configuration from somewhere; where is it? So an answer explaining that would have a better chance of getting the bounty. It would also be very convenient, if there was some way to tell pam-auth-update to write the output to a different directory. That could even be used as an unprivileged user. Show 2 more comments. Steve Almond Steve Almond 7 7 bronze badges.
Sign up or log in Sign up using Google. Sign up using Facebook. Sign up using Email and Password. Post as a guest Name. Email Required, but never shown. Active Oldest Votes. Sign up or log in Sign up using Google. Sign up using Facebook. Sign up using Email and Password. Post as a guest Name. Email Required, but never shown. The Overflow Blog. Stack Gives Back Safety in numbers: crowdsourcing data on nefarious IP addresses.
Like many system configuration utilities, authentication can be configured with a graphical user interface GUI tool, via an interactive text interface TUI , or at the command-line.
Let's look at all three options. The graphical tool is provided by the authconfig-gtk package. This utility has multiple tabs to organize the options:. The interactive text version "TUI" is accessed with the authconfig-tui command. Finally, there is the scriptable command-line tool authconfig. This command also has many options which are described with the --help option and in the man page.
The graphical and text versions are interactive, but have limited options. Before we get to the specifics of using the command-line options, let's look at the changes made by enabling the fingerprint reader using either authconfig-tui or authconfig-gtk :. With the option disabled, only the fingerprint-auth file contains references to the fprintd module. This file has a lot of useful comments showing syntax and default values.
After changing one of the fields, all the options are set at the end of the file:. One of the tricky things to remember when using authconfig at the command-line is to add the --update option. There is a --test option to check syntax, an --update option to update the authconfig information and the actual configuration files for the options specified, and an --updateall option that resets all configuration files to match the authconfig settings. The --updateall option is a great way to delete all the manual changes that an administrator may have made to the system.
My workflow typically just uses the --update option for each change. If you run the authconfig commands as an ordinary user, you are prompted for a password to escalate privileges before the commands run. Add a comment. Active Oldest Votes. Sign up or log in Sign up using Google. Sign up using Facebook. Sign up using Email and Password.
Post as a guest Name. Email Required, but never shown. The Overflow Blog.
0コメント