From: jan@unixpapa.com Date: Mon, 21 May 2012 13:20:57 +0000 (+0000) Subject: Clarified some instructions. X-Git-Tag: pwauth-2.3.11~2 X-Git-Url: https://granicus.if.org/sourcecode?a=commitdiff_plain;h=7a565fdb824199ad9024b8951666e31893d69ec5;p=pwauth Clarified some instructions. --- diff --git a/pwauth/config.h b/pwauth/config.h index 6f8e1b6..3434489 100644 --- a/pwauth/config.h +++ b/pwauth/config.h @@ -270,10 +270,11 @@ * * The second option is to create a special group, called something like * "pwauth" for user id's that are allowed to run pwauth. To do this, you - * should compile pwauth with the SERVER_UIDS variable UNDEFINED. This will - * disable the runtime uid check. Then, when you install the pwauth program, - * set it's group ownership to the "pwauth" group, and permit it so that only - * the owner and the group can run it. Do not permit it to be executable to + * should compile pwauth with the SERVER_UIDS variable UNDEFINED (that is + * the definition should be removed or commented out). This will disable the + * runtime uid check. Then, when you install the pwauth program, set it's + * group ownership to the "pwauth" group, and permit it so that only the + * owner and the group can run it. Do not permit it to be executable to * others. This has the advantage of not requiring a recompile if you want * to change the uid list. */