Re: allowing users to change their own passwords (solaris 10)

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



I got it from docs.sun.com:

-bash-3.00# cat /etc/pam.conf
#
# Authentication management
#
# login service (explicit because of pam_dial_auth)
#
login   auth requisite          pam_authtok_get.so.1
login   auth required           pam_dhkeys.so.1
login   auth required           pam_dial_auth.so.1
login   auth required           pam_unix_cred.so.1
login   auth sufficient         pam_unix_auth.so.1
login   auth required           pam_ldap.so.1
#
# rlogin service (explicit because of pam_rhost_auth)
#
rlogin  auth sufficient         pam_rhosts_auth.so.1
rlogin  auth requisite          pam_authtok_get.so.1
rlogin  auth required           pam_dhkeys.so.1
rlogin  auth required           pam_unix_cred.so.1
rlogin  auth sufficient         pam_unix_auth.so.1
rlogin  auth required           pam_ldap.so.1
#
# rsh service (explicit because of pam_rhost_auth,
# and pam_unix_auth for meaningful pam_setcred)
#
rsh     auth sufficient         pam_rhosts_auth.so.1
rsh     auth required           pam_unix_cred.so.1
#
# PPP service (explicit because of pam_dial_auth)
#
ppp     auth requisite          pam_authtok_get.so.1
ppp     auth required           pam_dhkeys.so.1
ppp     auth required           pam_dial_auth.so.1
ppp     auth sufficient         pam_unix_auth.so.1
ppp     auth required           pam_ldap.so.1
#
# Default definitions for Authentication management
# Used when service name is not explicitly mentioned for authentication
#
other   auth requisite          pam_authtok_get.so.1
other   auth required           pam_dhkeys.so.1
other   auth required           pam_unix_cred.so.1
other   auth sufficient         pam_unix_auth.so.1
other   auth required           pam_ldap.so.1
#
# passwd command (explicit because of a different authentication module)
#
passwd  auth sufficient         pam_passwd_auth.so.1
passwd  auth required           pam_ldap.so.1
#
# cron service (explicit because of non-usage of pam_roles.so.1)
#
cron    account required        pam_unix_account.so.1
#
# Default definition for Account management
# Used when service name is not explicitly mentioned for account management
#
other   account requisite       pam_roles.so.1
other   account required        pam_unix_account.so.1
#


--- George Holbert <gholbert@xxxxxxxxxxxx> wrote:

> Susan,
> 
> What does your PAM password stack look like on the Solaris 10 client?
> -- George
> 
> Susan wrote:
> > Well, I've gotten authentication working for solaris 10 & FDS.  (Thank you, everybody)
> >
> > As root, I can change any user's password and that works.  As a regular user, however, no
> luck:
> >
> > -bash-3.00$ passwd
> > passwd: Changing password for test
> > passwd: Sorry, wrong passwd
> > Permission denied
> >
> > -bash-3.00$ passwd -r ldap
> > passwd: Changing password for test
> > passwd: Sorry, wrong passwd
> > Permission denied
> > -bash-3.00$ 
> >
> > I've this aci:
> >
> > (targetattr="carLicense ||description ||displayName ||facsimileTelephoneNumber ||homePhone
> > ||homePostalAddress ||initials ||jpegPhoto ||labeledURL ||mail ||mobile ||pager ||photo
> > ||postOfficeBox ||postalAddress ||postalCode ||preferredDeliveryMethod ||preferredLanguage
> > ||registeredAddress ||roomNumber ||secretary ||seeAlso ||st ||street ||telephoneNumber
> > ||telexNumber ||title ||userCertificate ||userPassword ||userSMIMECertificate
> > ||x500UniqueIdentifier")(version 3.0; acl "Enable self write for common attributes"; allow
> (write)
> > userdn="ldap:///self";;)
> >
> > Doesn't seem to be doing anything, even though userPassword is in there. Btw, in Linux,
> non-root
> > users can change their passwords just fine!
> >
> > I've also two of these ACIs which I got from Gary Tay's site:
> >
> > (target="ldap:///dc=company,dc=com";)(targetattr="userPassword")(version 3.0; acl
> > LDAP_Naming_Services_proxy_password_read; allow (compare,search) userdn =
> > "ldap:///cn=proxyagent,ou=profile,dc=company,dc=com";;)
> >
> > (targetattr =
> >
>
"cn||uid||uidNumber||gidNumber||homeDirectory||shadowLastChange||shadowMin||shadowMax||shadowWarning||shadowInactive||shadowExpire||shadowFlag||memberUid")(version
> > 3.0; acl LDAP_Naming_Services_deny_write_access;deny (write) userdn = "ldap:///self";;)
> >
> > They seem to doing nothing either, i.e. removing them neither fixes nor breaks anything.
> >
> > Nothing in server/client logs either...
> >
> > Any ideas?
> >
> > __________________________________________________
> > Do You Yahoo!?
> > Tired of spam?  Yahoo! Mail has the best spam protection around 
> > http://mail.yahoo.com 
> >
> > --
> > Fedora-directory-users mailing list
> > Fedora-directory-users@xxxxxxxxxx
> > https://www.redhat.com/mailman/listinfo/fedora-directory-users
> >
> >   
> 
> 
> --
> Fedora-directory-users mailing list
> Fedora-directory-users@xxxxxxxxxx
> https://www.redhat.com/mailman/listinfo/fedora-directory-users
> 


__________________________________________________
Do You Yahoo!?
Tired of spam?  Yahoo! Mail has the best spam protection around 
http://mail.yahoo.com 

--
Fedora-directory-users mailing list
Fedora-directory-users@xxxxxxxxxx
https://www.redhat.com/mailman/listinfo/fedora-directory-users

[Index of Archives]     [Fedora Directory Users]     [Fedora Directory Devel]     [Fedora Announce]     [Fedora Legacy Announce]     [Kernel]     [Fedora Legacy]     [Share Photos]     [Fedora Desktop]     [PAM]     [Red Hat Watch]     [Red Hat Development]     [Big List of Linux Books]     [Gimp]     [Yosemite News]

  Powered by Linux