pam_rootok is a PAM module that authenticates the user if their UID
is 0. Applications that are created setuid-root generally retain the
UID of the user but run with the authority of an enhanced
effective-UID. It is the real UID that is checked.
In the case of the su(1) application the historical usage is to
permit the superuser to adopt the identity of a lesser user without
the use of a password. To obtain this behavior with PAM the following
pair of lines are needed for the corresponding entry in the
/etc/pam.d/su configuration file:
# su authentication. Root is granted access by default.
auth sufficient pam_rootok.so
auth required pam_unix.so
This page is part of the linux-pam (Pluggable Authentication Modules
for Linux) project. Information about the project can be found at
⟨https://fedorahosted.org/linux-pam/⟩. If you have a bug report for
this manual page, see ⟨https://fedorahosted.org/linux-pam/report⟩.
This page was obtained from the tarball Linux-PAM-1.3.0.tar.gz
fetched from ⟨http://www.linux-pam.org/library/⟩ on 2017-03-13. If
you discover any rendering problems in this HTML version of the page,
or you believe there is a better or more up-to-date source for the
page, or you have corrections or improvements to the information in
this COLOPHON (which is not part of the original manual page), send a
mail to firstname.lastname@example.org
Linux-PAM Manual 04/01/2016 PAM_ROOTOK(8)