When the user which is logging in matches an entry in the config file he is allowed access only when the SELinux is in enforcing mode. Otherwise he is denied access. For users not matching any entry in the config file the pam_selinux_permit module returns PAM_IGNORE return value.
The config file contains a simple list of user names one per line. If the name is prefixed with @ character it means that all users in the group name match. If it is prefixed with a % character the SELinux user is used to match against the name instead of the account name. Note that when SELinux is disabled the SELinux user assigned to the account cannot be determined. This means that such entries are never matched when SELinux is disabled and pam_selinux_permit will return PAM_IGNORE.
debug
conf=/path/to/config/file
Only the auth and account services are supported.
PAM_AUTH_ERR
PAM_SUCCESS
PAM_IGNORE
PAM_USER_UNKNOWN
PAM_SERVICE_ERR
/etc/security/sepermit.conf
auth [success=done ignore=ignore default=bad] pam_selinux_permit.so auth required pam_unix.so account required pam_unix.so session required pam_permit.so
pam_selinux_permit was written by Tomas Mraz <tmraz@redhat.com>.