yaleman on kanidm_cli_docker
bump (compare)
yaleman on kanidm_cli_docker
updated (compare)
yaleman on kanidm_cli_docker
fixing up dockerfiles (compare)
yaleman on kanidm_cli_docker
updated Added KANIDM_BUILD_PROFILE to k… (compare)
yaleman on kanidm_cli_docker
adding kanidm image and config updated removing npm deps from build an… and 5 more (compare)
github-actions[bot] on gh-pages
deploy: 4830479bd51d88ac40fb514… (compare)
github-actions[bot] on gh-pages
deploy: dd973eb0ec0fa70268806bf… (compare)
yaleman on pip
yaleman on master
Bump mkdocs-material from 8.3.8… (compare)
yaleman on cargo
yaleman on master
Bump tide-compress from 0.10.3 … (compare)
dependabot[bot] on github_actions
yaleman on master
Bump actions/setup-python from … (compare)
dependabot[bot] on github_actions
systemctl edit kanidm-unix.service
[Service]
Environment="RUST_LOG=kanidm=debug"
in pam, on lines with pam_kanidm.so, add the option debug
% cat su
#%PAM-1.0
auth sufficient pam_rootok.so
# Uncomment the following line to implicitly trust users in the "wheel" group.
#auth sufficient pam_wheel.so trust use_uid
# Uncomment the following line to require a user to be in the "wheel" group.
#auth required pam_wheel.so use_uid
auth required pam_unix.so
account required pam_unix.so
session required pam_unix.so
password include system-auth
pam.d/su-l
is identical
$ sudo --user=nirya --login
We trust you have received the usual lecture from the local System
Administrator. It usually boils down to these three things:
#1) Respect the privacy of others.
#2) Think before you type.
#3) With great power comes great responsibility.
[sudo] password for safety:
acct_mgmt
args -> ["debug", "ignore_unknown_user"]
opts -> Options { debug: true, use_first_pass: false, ignore_unknown_user: true }