User's Manual
 Solaris 9 Security CX-310-301    61   
¾  Control Flag – The deciding factor on what constitutes a success or failure – can be requisite, 
required, optional or sufficient. When an auth module is used for example, the controls function 
like this: 
•  Requisite – The module being executed must be successful for any further authentication 
to be allowed. 
•  Required – The overall result of the authentication must be successful. If a failure occurs 
in a module, all others are still tried, but an error is returned 
•  Optional – This flag means that if a failure occurs in a module, then the overall result can 
still be successful, if another module returns a successful completion 
•  Sufficient – As long as this module is successful, then there is no need to run any others – 
the authentication can finish and return successful 
¾  Module Path – The pathname to the module 
¾  Module Option(s) – Specific options that can be passed to the module, such as debug or 
use_first_pass (this latter option allows the password entered by the user to be automatically 
inserted in subsequent authentication modules, eliminating the need for the user to enter the 
password multiple times) 
Deploying PAM in a Production Environment 
Before using PAM in a live environment, consider the following aspects: 
¾  Choose the control flags carefully to ensure that the right level of security is being applied. This is 
particularly relevant when deciding to use the sufficient or optional flags 
¾  Decide which modules you need to use to obtain the required level of security 
¾  Pay special attention to the services being used and highlight any that might need additional 
authentication modules for added security 
¾  Don’t apply unnecessary levels of security, they only serve to add to the complexity and the 
overhead required 
¾  Select the order in which modules should be used. If a failure will stop the entire authentication 
process, then put this one above other, less important modules so that unnecessary processing is 
avoided 
Add a new PAM Module 
Follow these steps when adding a new PAM module: 
¾  Login and become superuser ( root ) 
¾  Ensure you have selected the type of authentication required as well as any options that might be 
needed 
¾  Install the new module in /usr/lib/security 










