NAME
pam_acct_mgmt  — perform PAM account validation procedures 
SYNOPSIS
cc 
[ flag ... ] file ...
-lpam 
[ library ... ]
#include <security/pam_appl.h> 
int pam_acct_mgmt(pam_handle_t *pamh,
int flags);
DESCRIPTION
The function
pam_acct_mgmt()
is called to determine if the current user's account is
valid.  This includes checking for password and account expiration,
as well as verifying access hour restrictions and terminal access
restrictions for trusted mode.  This function
is typically called after the user has been authenticated
with
pam_authenticate(3).
The
pamh
argument
is an authentication handle obtained by a prior call to
pam_start().
The following flags may be set in the
flags
field:
- PAM_SILENT 
 The account management service should not generate any messages
- PAM_DISALLOW_NULL_AUTHTOK 
 The account management service should return 
PAM_AUTHTOKEN_REQD
if the user has a null authentication token.
RETURN VALUES
Upon successful completion,
PAM_SUCCESSisreturned.
In addition to the error return values described in
pam(3),
the following values may be returned:
- PAM_USER_UNKNOWN 
 User not known to underlying account management module.
- PAM_AUTH_ERR 
 Authentication failure.
- PAM_AUTHTOKEN_REQD 
 New authentication token required. This is normally returned if the machine
security policies require that the password should be changed because
the password is NULL or it has aged.
- PAM_ACCT_EXPIRED 
 User account has expired.
- PAM_ACCT_DISABLED 
 User account has been disabled (trusted mode only).
- PAM_TERM_DISABLED 
 Terminal has been disabled (trusted mode only).
- PAM_NOT_AUTHORIZED 
 User is not authorized for terminal access (trusted mode only).
- PAM_NOT_RTIME 
 Wrong time to login (trusted mode only).