diff options
| author | Wanja Zaeske <wanja.zaeske@dlr.de> | 2022-05-18 15:22:46 +0200 |
|---|---|---|
| committer | Wanja Zaeske <wanja.zaeske@dlr.de> | 2022-05-18 15:22:46 +0200 |
| commit | 305b633423fce2fc4848bcf9e45379ef51eb738c (patch) | |
| tree | f80fd90d554a32bc48f9e37cef1e8085d618707f /pkgs/development/python-modules/python-mapnik/python-mapnik_std_optional.patch | |
| parent | 675f9f6e432e2cf36c6712aa58d0bb17c145c92d (diff) | |
nixos/modules/security/pam: fix #95798 & #128116
Previously, `pam_unix.so` was `required` to set PAM_AUTHTOK so that
dependent pam modules (such as gnome keyering) could use the password
(for example to unlock a keyring) upon login of the user. This however
broke any additional auth providers (such as AD or LDAP): for any
non-local user `pam_unix.so` will not yield success, thus eventually the
auth would fail (even the following auth providers were actually
executed, they could not overrule the already failed auth).
This change replaces `required` by `optional`. Therefore, the
`pam_unix.so` is executed and can set the PAM_AUTHTOK for the following
optional modules, _even_ if the user is not a local user. Therefore, the
gnome keyring for example is unlocked both for local and additional
users upon login, and login is working for non-local users via
LDAP/AD.
Diffstat (limited to 'pkgs/development/python-modules/python-mapnik/python-mapnik_std_optional.patch')
0 files changed, 0 insertions, 0 deletions
