1.\" $NetBSD: pam_permit.8,v 1.3 2005/02/26 15:08:54 thorpej Exp $
2.\" Copyright (c) 2001 Mark R V Murray
3.\" All rights reserved.
4.\"
5.\" Redistribution and use in source and binary forms, with or without
6.\" modification, are permitted provided that the following conditions
7.\" are met:
8.\" 1. Redistributions of source code must retain the above copyright
9.\"    notice, this list of conditions and the following disclaimer.
10.\" 2. Redistributions in binary form must reproduce the above copyright
11.\"    notice, this list of conditions and the following disclaimer in the
12.\"    documentation and/or other materials provided with the distribution.
13.\"
14.\" THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
15.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
16.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
17.\" ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
18.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
19.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
20.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
21.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
22.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
23.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
24.\" SUCH DAMAGE.
25.\"
26.\" $FreeBSD: src/lib/libpam/modules/pam_permit/pam_permit.8,v 1.3 2001/07/13 09:09:50 ru Exp $
27.\"
28.Dd July 7, 2001
29.Dt PAM_PERMIT 8
30.Os
31.Sh NAME
32.Nm pam_permit
33.Nd Promiscuous PAM module
34.Sh SYNOPSIS
35.Op Ar service-name
36.Ar module-type
37.Ar control-flag
38.Pa pam_permit
39.Op Ar options
40.Sh DESCRIPTION
41The Promiscuous authentication service module for PAM
42provides functionality for all the PAM categories:
43authentication,
44account management,
45session management and
46password management.
47In terms of the
48.Ar module-type
49parameter, these are the
50.Dq Li auth ,
51.Dq Li account ,
52.Dq Li session ,
53and
54.Dq Li password
55features.
56.Pp
57The Promiscuous module
58will universally allow all requests.
59It is primarily of use during testing,
60and to silence
61.Dq noisy
62PAM-enabled applications.
63.Pp
64The following options may be passed to the module:
65.Bl -tag -width ".Cm debug"
66.It Cm debug
67.Xr syslog 3
68debugging information at
69.Dv LOG_DEBUG
70level.
71.El
72.Sh SEE ALSO
73.Xr syslog 3 ,
74.Xr pam.conf 5 ,
75.Xr pam 8
76