1. Ensure that /etc/pam.conf has a defined passwd stanza to ensure it does not use the other stanza
$ cat /etc/pam.conf | grep passwd
# passwd command (explicit because of a different authentication module)
passwd auth required pam_passwd_auth.so.1
2. Modify the functional account
- Assign the "User Security" role so the functional account can reset other users password
- Assigned the file_dac_read priviledge so the functional account can access the /etc/shadow file to check passwords
- Change the users default shell to /usr/bin/pfsh
Below is an example (where funacact is the local functional account)
# usermod -P "User Security" -s /usr/bin/pfsh -K defaultpriv=basic,file_dac_read funcacct
As the users shell is set to the profile shell (/usr/bin/pfsh) no delegation prefix will be required to be set in TPAM. If you wish to use a standard shell instead, you can set the delegation prefix of pfexec in TPAM.
© 2025 One Identity LLC. ALL RIGHTS RESERVED. 이용 약관 개인정보 보호정책 Cookie Preference Center