#%PAM-1.0
-auth required /lib/security/pam_listfile.so item=user sense=deny file=/etc/security/blacklist onerr=succeed
-auth required /lib/security/pam_listfile.so item=user sense=deny file=/etc/security/blacklist.login onerr=succeed
-auth required /lib/security/pam_securetty.so
-auth required /lib/security/pam_unix.so
-auth required /lib/security/pam_tally.so file=/var/log/faillog onerr=succeed no_magic_root
-auth required /lib/security/pam_shells.so
-auth required /lib/security/pam_nologin.so
-auth optional /lib/security/pam_mail.so
-account required /lib/security/pam_tally.so deny=0 file=/var/log/faillog onerr=succeed no_magic_root
-account required /lib/security/pam_access.so
-account required /lib/security/pam_time.so
-account required /lib/security/pam_unix.so
-password required /lib/security/pam_cracklib.so difok=2 minlen=8 dcredit=2 ocredit=2 retry=3
-password required /lib/security/pam_unix.so md5 shadow use_authtok
-password required /lib/security/pam_make.so /var/db
-session required /lib/security/pam_unix.so
-session required /lib/security/pam_env.so
-session required /lib/security/pam_limits.so change_uid
-session optional /lib/security/pam_console.so
+auth required pam_listfile.so item=user sense=deny file=/etc/security/blacklist.login onerr=succeed
+auth required pam_securetty.so
+auth include system-auth
+auth include postlogin
+account required pam_shells.so
+account required pam_nologin.so
+account required pam_access.so
+account include system-auth
+password include system-auth
+# pam_selinux.so close should be the first session rule
+# session required pam_selinux.so close
+session required pam_loginuid.so
+session include system-auth
+session include postlogin
+session optional pam_console.so
+session optional pam_mail.so
+#session optional pam_motd.so motd=/etc/motd
+# pam_selinux.so open should only be followed by sessions to be executed in the user context
+#session required pam_selinux.so open
+#session optional pam_keyinit.so force revoke
+-session optional pam_ck_connector.so