Файловый менеджер - Редактировать - /home/jogoso94/public_html/static/img/logo/pam.d.zip
�азад
PK Ԏ[:��� � passwdnu �[��� #%PAM-1.0 # This tool only uses the password stack. password substack system-auth -password optional pam_gnome_keyring.so use_authtok password substack postlogin PK Ԏ[��Y�$ $ screennu �[��� #%PAM-1.0 auth include system-auth PK Ԏ[%L�_� � systemd-usernu �[��� # This file is part of systemd. # # Used by systemd --user instances. account sufficient pam_unix.so no_pass_expiry account include system-auth session required pam_selinux.so close session required pam_selinux.so nottys open session required pam_loginuid.so session optional pam_keyinit.so force revoke session optional pam_umask.so silent session required pam_namespace.so session include system-auth PK Ԏ[�� � postloginnu �[��� #%PAM-1.0 # This file is auto-generated. # User changes will be destroyed the next time authselect is run. session optional pam_umask.so silent session [success=1 default=ignore] pam_succeed_if.so service !~ gdm* service !~ su* quiet session [default=1] pam_lastlog.so nowtmp showfailed session optional pam_lastlog.so silent noupdate showfailed PK Ԏ[=���6 6 sunu �[��� #%PAM-1.0 auth required pam_env.so auth sufficient pam_rootok.so # Uncomment the following line to implicitly trust users in the "wheel" group. #auth sufficient pam_wheel.so trust use_uid # Uncomment the following line to require a user to be in the "wheel" group. #auth required pam_wheel.so use_uid auth substack system-auth auth include postlogin account sufficient pam_succeed_if.so uid = 0 use_uid quiet account include system-auth password include system-auth session include system-auth session include postlogin session optional pam_xauth.so PK Ԏ[��|� � smartcard-authnu �[��� #%PAM-1.0 # This file is auto-generated. # User changes will be destroyed the next time authselect is run. auth required pam_env.so auth [success=done ignore=ignore default=die] pam_pkcs11.so wait_for_card auth required pam_deny.so account required pam_unix.so account sufficient pam_localuser.so account sufficient pam_succeed_if.so uid < 500 quiet account required pam_permit.so password optional pam_pkcs11.so session optional pam_keyinit.so revoke session required pam_limits.so -session optional pam_systemd.so session [success=1 default=ignore] pam_succeed_if.so service in crond quiet use_uid session required pam_unix.so PK Ԏ[<��� � sshdnu �[��� #%PAM-1.0 auth substack password-auth auth include postlogin account required pam_sepermit.so account required pam_nologin.so account include password-auth password include password-auth # pam_selinux.so close should be the first session rule session required pam_selinux.so close session required pam_loginuid.so # pam_selinux.so open should only be followed by sessions to be executed in the user context session required pam_selinux.so open env_params session required pam_namespace.so session optional pam_keyinit.so force revoke session optional pam_motd.so session include password-auth session include postlogin auth required pam_shells.so PK Ԏ[q�!y atdnu �[��� # The PAM configuration file for the at daemon # # auth required pam_env.so auth include password-auth account required pam_access.so account include password-auth session required pam_loginuid.so session include password-auth PK Ԏ[��p� � fingerprint-authnu �[��� #%PAM-1.0 # This file is auto-generated. # User changes will be destroyed the next time authselect is run. auth required pam_env.so auth sufficient pam_fprintd.so auth required pam_deny.so account required pam_unix.so account sufficient pam_localuser.so account sufficient pam_succeed_if.so uid < 500 quiet account required pam_permit.so password required pam_deny.so session optional pam_keyinit.so revoke session required pam_limits.so -session optional pam_systemd.so session [success=1 default=ignore] pam_succeed_if.so service in crond quiet use_uid session required pam_unix.so PK Ԏ[RZ� � remotenu �[��� #%PAM-1.0 auth substack password-auth auth include postlogin account required pam_nologin.so account include password-auth password include password-auth # pam_selinux.so close should be the first session rule session required pam_selinux.so close session required pam_loginuid.so # pam_selinux.so open should only be followed by sessions to be executed in the user context session required pam_selinux.so open session required pam_namespace.so session optional pam_keyinit.so force revoke session include password-auth session include postlogin PK Ԏ[�#%V V chfnnu �[��� #%PAM-1.0 auth sufficient pam_rootok.so auth include system-auth account required pam_succeed_if.so shell != /usr/local/cpanel/bin/noshell account required pam_succeed_if.so shell != /usr/local/cpanel/bin/jailshell account include system-auth password include system-auth session include system-auth PK Ԏ[h�� � runusernu �[��� #%PAM-1.0 auth sufficient pam_rootok.so session optional pam_keyinit.so revoke session required pam_limits.so session required pam_unix.so PK Ԏ[� �� � pure-ftpdnu �[��� #%PAM-1.0 # Sample PAM configuration file for Pure-FTPd. # Install it in /etc/pam.d/pure-ftpd or add to /etc/pam.conf auth required pam_listfile.so item=user sense=deny file=/etc/ftpusers onerr=succeed auth required pam_shells.so auth required pam_nologin.so account required pam_stack.so service=system-auth password required pam_stack.so service=system-auth session required pam_stack.so service=system-auth PK Ԏ[� 1�� � cockpitnu �[��� #%PAM-1.0 auth required pam_sepermit.so auth substack password-auth auth include postlogin auth optional pam_ssh_add.so # List of users to deny access to Cockpit, by default root is included. account required pam_listfile.so item=user sense=deny file=/etc/cockpit/disallowed-users onerr=succeed account required pam_nologin.so account include password-auth password include password-auth # pam_selinux.so close should be the first session rule session required pam_selinux.so close session required pam_loginuid.so # pam_selinux.so open should only be followed by sessions to be executed in the user context session required pam_selinux.so open env_params session optional pam_keyinit.so force revoke session optional pam_ssh_add.so session include password-auth session include postlogin PK Ԏ[I��m� � sssd-shadowutilsnu �[��� #%PAM-1.0 auth required pam_hulk.so auth [success=done ignore=ignore default=die] pam_unix.so nullok try_first_pass auth required pam_deny.so account required pam_unix.so account required pam_permit.so PK Ԏ[a���T T vlocknu �[��� #%PAM-1.0 auth include system-auth account required pam_permit.so PK Ԏ[�#%V V chshnu �[��� #%PAM-1.0 auth sufficient pam_rootok.so auth include system-auth account required pam_succeed_if.so shell != /usr/local/cpanel/bin/noshell account required pam_succeed_if.so shell != /usr/local/cpanel/bin/jailshell account include system-auth password include system-auth session include system-auth PK Ԏ[�k� system-authnu �[��� #%PAM-1.0 # This file is auto-generated. # User changes will be destroyed the next time authselect is run. auth required pam_env.so auth required pam_hulk.so auth sufficient pam_unix.so try_first_pass nullok auth required pam_deny.so account required pam_unix.so password requisite pam_pwquality.so try_first_pass local_users_only retry=3 authtok_type= password sufficient pam_unix.so try_first_pass use_authtok nullok sha512 shadow password required pam_deny.so session optional pam_keyinit.so revoke session required pam_limits.so -session optional pam_systemd.so session [success=1 default=ignore] pam_succeed_if.so service in crond quiet use_uid session required pam_unix.so PK Ԏ[ ��t t eximnu �[��� #%PAM-1.0 auth required /lib/security/pam_pwdb.so shadow nullok account required /lib/security/pam_pwdb.so PK Ԏ[��� � runuser-lnu �[��� #%PAM-1.0 auth include runuser session optional pam_keyinit.so force revoke -session optional pam_systemd.so session include runuser PK Ԏ[�M}�� � config-utilnu �[��� #%PAM-1.0 auth sufficient pam_rootok.so auth sufficient pam_timestamp.so auth include system-auth account required pam_permit.so session required pam_permit.so session optional pam_xauth.so session optional pam_timestamp.so PK Ԏ[#f�3B B crondnu �[��� # # The PAM configuration file for the cron daemon # # # Although no PAM authentication is called, auth modules # are used for credential setting auth include system-auth account required pam_access.so account include system-auth session required pam_loginuid.so session include system-auth PK Ԏ[XTe}� � dovecotnu �[��� #%PAM-1.0 auth required pam_nologin.so auth include system-auth account include system-auth session include system-auth PK Ԏ[e�� � polkit-1nu �[��� #%PAM-1.0 auth include system-auth account include system-auth password include system-auth session include system-auth PK Ԏ[7�(^� � sudo-inu �[��� #%PAM-1.0 auth include sudo account include sudo password include sudo session optional pam_keyinit.so force revoke session include sudo PK Ԏ[�|ˊF F postgresql_cpsesnu �[��� #%PAM-1.0 auth required pam_cpses.so account required pam_cpses.so PK Ԏ[��� � othernu �[��� #%PAM-1.0 auth required pam_deny.so account required pam_deny.so password required pam_deny.so session required pam_deny.so PK Ԏ[�؟�� � su-lnu �[��� #%PAM-1.0 auth include su account include su password include su session optional pam_keyinit.so force revoke session include su PK Ԏ[�k� password-authnu �[��� #%PAM-1.0 # This file is auto-generated. # User changes will be destroyed the next time authselect is run. auth required pam_env.so auth required pam_hulk.so auth sufficient pam_unix.so try_first_pass nullok auth required pam_deny.so account required pam_unix.so password requisite pam_pwquality.so try_first_pass local_users_only retry=3 authtok_type= password sufficient pam_unix.so try_first_pass use_authtok nullok sha512 shadow password required pam_deny.so session optional pam_keyinit.so revoke session required pam_limits.so -session optional pam_systemd.so session [success=1 default=ignore] pam_succeed_if.so service in crond quiet use_uid session required pam_unix.so PK Ԏ[�s� � loginnu �[��� #%PAM-1.0 auth substack system-auth auth include postlogin account required pam_nologin.so account include system-auth password include system-auth # pam_selinux.so close should be the first session rule session required pam_selinux.so close session required pam_loginuid.so # pam_selinux.so open should only be followed by sessions to be executed in the user context session required pam_selinux.so open session required pam_namespace.so session optional pam_keyinit.so force revoke session include system-auth session include postlogin -session optional pam_ck_connector.so PK Ԏ[3�&� � sudonu �[��� #%PAM-1.0 auth include system-auth account include system-auth password include system-auth session include system-auth PK Ԏ[:��� � passwdnu �[��� PK Ԏ[��Y�$ $ � screennu �[��� PK Ԏ[%L�_� � 8 systemd-usernu �[��� PK Ԏ[�� � postloginnu �[��� PK Ԏ[=���6 6 � sunu �[��� PK Ԏ[��|� � A smartcard-authnu �[��� PK Ԏ[<��� � f sshdnu �[��� PK Ԏ[q�!y � atdnu �[��� PK Ԏ[��p� � � fingerprint-authnu �[��� PK Ԏ[RZ� � � remotenu �[��� PK Ԏ[�#%V V � chfnnu �[��� PK Ԏ[h�� � runusernu �[��� PK Ԏ[� �� � � pure-ftpdnu �[��� PK Ԏ[� 1�� � � cockpitnu �[��� PK Ԏ[I��m� � � sssd-shadowutilsnu �[��� PK Ԏ[a���T T � vlocknu �[��� PK Ԏ[�#%V V g chshnu �[��� PK Ԏ[�k� � system-authnu �[��� PK Ԏ[ ��t t ># eximnu �[��� PK Ԏ[��� � �# runuser-lnu �[��� PK Ԏ[�M}�� � �$ config-utilnu �[��� PK Ԏ[#f�3B B �% crondnu �[��� PK Ԏ[XTe}� � C'