pam_acct_mgmt - perform PAM account validation procedures
cc [ flag ... ] file ... –lpam [ library ... ] #include <security/pam_appl.h> int pam_acct_mgmt(pam_handle_t * pamh, int flags);
The pam_acct_mgmt() function is called to determine if the current authenticated user's account is valid. This includes the following checks:
If the password needs to be changed
If the account is locked
The /etc/nologin file is not present for non-root users (see nologin(5))
The pam_acct_mgmt() function is typically called after the user has been authenticated with pam_authenticate(3PAM).
The pamh argument is an authentication handle obtained by a prior call to pam_start(). The following flags may be set in the flags field:
The account management service should not generate any messages.
The account management service should return PAM_NEW_AUTHTOK_REQD if the user has a null authentication token.
Upon successful completion, PAM_SUCCESS is returned. In addition to the error return values described in pam(3PAM), the following values may be returned:
User not known to underlying account management module.
New authentication token required. This is normally returned if the machine security policies require that the password should be changed because the password is NULL or has aged.
User account has expired.
Logins for non-root users are disabled due to the presence of the /etc/nologin file. See nologin(5)
See attributes(7) for description of the following attributes:
The interfaces in libpam are MT-Safe only if each thread within the multithreaded application uses its own PAM handle.