PAM_ALLOW(7) Standards, Environments, and Macros PAM_ALLOW(7)

pam_allow - PAM authentication, account, session and password management PAM module to allow operations

The pam_allow module implements all the PAM service module functions and returns PAM_SUCCESS for all calls. Opposite functionality is available in the pam_deny(7) module.

Proper authentication operation requires pam_unix_cred(7) be stacked above pam_allow.

The following options are interpreted:


Provides syslog(3C) debugging information at the LOG_AUTH | LOG_DEBUG level.

PAM_SUCCESS is always returned.

Example 1 Allowing ssh none

The following example is a pam.conf fragment that illustrates a sample for allowing ssh none authentication:

sshd-none  auth    required
sshd-none  auth    sufficient
sshd-none  account sufficient
sshd-none  session sufficient
sshd-none  password sufficient

Example 2 Allowing Kiosk Automatic Login Service

The following is example is a pam.conf fragment that illustrates a sample for allowing gdm kiosk auto login:

gdm-autologin auth  required
gdm-autologin auth  sufficient

See attributes(7) for descriptions of the following attributes:

Interface Stability Stable
MT Level MT-Safe with exceptions

syslog(3C), libpam(3LIB), pam(3PAM), pam_sm(3PAM), pam.conf(5), attributes(7), pam_deny(7), pam_unix_cred(7)

The interfaces in libpam(3LIB) are MT-Safe only if each thread within the multi-threaded application uses its own PAM handle.

This module is intended to be used to either allow access to specific services names, or to all service names not specified (by specifying it as the default service stack).

August 19, 2023 OmniOS