Kubuntu 15.04 SDDM Log in with the root user

Source: Internet
Author: User
Tags auth

Kubuntu 15.04 start with SDDM to replace KDM, log in when you want to log in with the root user?

easy!!!

~ #cat  /etc/sddm.conf [autologin]relogin=falsesession=user=[general]haltcommand=rebootcommand=[theme] cursortheme=breeze_cursors[users]hideshells=/sbin/nologin,/bin/false# hidden users, this  is if any system users fall within your range, see /etc/ Passwd on your system. hideusers=daemon bin sys sync man lp mail news uucp proxy  www-data backup list irc gnats nobody syslog messagebus colord  lightdm avahi-autoipd avahi usbmux kernoops rtkit whoopsie  Speech-dispatcher hplip saned mysql sshd festival dnsmasq dhcpd gdm  pulse postfix xrdp firebird vnstat ntpd usermetrics  uuidd  Icecast2 minidlna ntop memcache systemd-timesync systemd-network systemd-resolve  systemd-bus-proxy sddm# maximum user id for displayed users, , whatever. No other user can use 1maximumuid=65000# minimum user id for displayed users, root   User is 0 minimum ID to be 0minimumuid=0


Light, of course not.

~ #cat  /etc/pam.d/sddm#%PAM-1.0# Block login if they are globally  disabledauth    requisite       pam_nologin.so#  auth    required        pam_succeed_if.so  user != root nopasswdlogin   the point is here to comment on this line, replaced by the following line Auth    sufficient       pam_succeed_if.so user ingroup nopasswdlogin# auth     sufficient      pam_succeed_if.so user ingroup  nopasswdlogin@include common-auth-auth   optional         pam_gnome_keyring.so-auth   optional         pam_kwallet.so@include common-account# SELinux needs to be the  first session rule.  This ensures that any# lingering context has been cleared.   without this it is possible that a# module could execute  code in the wrong domain.session [success=ok ignore=ignore module_ Unknown=ignore default=bad] pam_selinux.so close# create a new session  keyring.session optional        pam_keyinit.so force  revokesession required        pam_limits.sosession  required        pam_loginuid.so@include common-session#  Selinux needs to intervene at login time to ensure that the  process starts# in the proper default security context.   Only sessions which&nbsP;are intended# to run in the user ' S context should be run  after this.session [success=ok ignore=ignore module_unknown=ignore default=bad]  pam_selinux.so open-session optional       pam_gnome_ keyring.so auto_start-session optional       pam_kwallet.so  auto_start@include common-password# from the pam_env man page# since  Setting of pam environment variables can have side effects to  other modules, this module should be the last one on  the stack.# load environment from /etc/environmentsession required         pam_env.so# load environment from /etc/default/ localesession required        pam_env.so envfile=/etc/default/locale 

Replaced the fifth line of the file

Of course, the root user has to set the password.

Then reboot, or Pkill SDDM will be OK.
















Kubuntu 15.04 SDDM Log in with the root user

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.