Apache-AuthCookiePAM
view release on metacpan or search on metacpan
AuthCookiePAM.pm view on Meta::CPAN
PerlModule Apache::AuthCookiePAM
PerlSetVar WhatEverPath /
PerlSetVar WhatEverLoginScript /login.pl
# Optional, to share tickets between servers.
PerlSetVar WhatEverDomain .domain.com
PerlSetVar WhatEverChangePwdScript /changepwd.pl
# These are optional, the module sets sensible defaults.
PerlSetVar WhatEverPAM_SessionLifetime 00-24-00-00
# Protected by AuthCookiePAM.
<Directory /www/domain.com/authcookiepam>
AuthType Apache::AuthCookiePAM
AuthName WhatEver
PerlAuthenHandler Apache::AuthCookiePAM->authenticate
PerlAuthzHandler Apache::AuthCookiePAM->authorize
require valid-user
</Directory>
AuthCookiePAM.pm view on Meta::CPAN
=item C<WhatEverPAM_SessionLifetime>
How long tickets are good for after being issued. Note that presently
Apache::AuthCookie does not set a client-side expire time, which means that
most clients will only keep the cookie until the user quits the browser.
However, if you wish to force people to log in again sooner than that, set
this value. This can be 'forever' or a life time specified as:
DD-hh-mm-ss -- Days, hours, minute and seconds to live.
This is not required and defaults to '00-24-00-00' or 24 hours.
=cut
$c{ PAM_sessionlifetime }
= _dir_config_var( $r, 'PAM_SessionLifetime' ) || '00-24-00-00';
=item C<WhatEverPAM_EncryptionType>
What kind of encryption to use to prevent the user from looking at the fields
in the ticket we give them. This is almost completely useless, so don't
switch it on unless you really know you need it. It does not provide any
protection of the password in transport; use SSL for that. It can be 'none',
'des', 'idea', 'blowfish', or 'blowfish_pp'.
This is not required and defaults to 'none'.
( run in 1.951 second using v1.01-cache-2.11-cpan-7add2cbd662 )