da2fa46551
Instead of the old workaround that replaces the whole PAM config, use Debian's framework (pam-configs) to add a rule for su. Enable it for users in qubes group only. PAM Config framework documentation: https://wiki.ubuntu.com/PAMConfigFrameworkSpec Issue: QubesOS/qubes-issues#5799 Original PR this change is based on: QubesOS/qubes-core-agent-linux#171
7 lines
208 B
Plaintext
7 lines
208 B
Plaintext
Name: allow su without password (by package qubes-core-agent-passwordless-root)
|
|
Default: yes
|
|
Priority: 258
|
|
Auth-Type: Primary
|
|
Auth:
|
|
sufficient pam_succeed_if.so use_uid user ingroup qubes service in su:su-l
|