Re: [389-users] PAM PTA partially working

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Hi,

You should not verify the users locally (there is a "no_user_check" to
add). The authoritative source of validation should be AD/Kerberos.
Here is the config that works for us :

auth    sufficient      /lib/security/pam_krb5.so no_user_check
account required        /lib/security/pam_krb5.so no_user_check

2009/9/22 Prashanth Sundaram <psundaram@xxxxxxxx>:
> Here is my /etc/pam.d/ldapserver
>
> auth        sufficient    /lib/security/pam_krb5.so use_first_pass
> forwardable
>
> password    sufficient    /lib/security/pam_krb5.so use_authtok
>
> session     optional      /lib/security/pam_krb5.so
>
> account     sufficient    /lib/security/pam_krb5.so
> ~
> ~
>
>
> To revisit, here's the observation: pamsecure when set to TRUE authenticates
> users only to the password in 389-ds, but when set to FALSE will
> authenticate to the AD password only if the uid exists in /etc/passwd.
>
>
> On 9/22/09 10:36 AM, "Rich Megginson" <rmeggins@xxxxxxxxxx> wrote:
>
>> Prashanth Sundaram wrote:
>>> The account in /etc/passwd..
>> Seems like a pam problem and/or misconfiguration then - if it finds the
>> entry using pam_krb5, it should never look at /etc/passwd.
>>>
>>> ------------------------------------------------------------------------
>>> Prashanth Sundaram wrote:
>>>
>>>
>>>     Yes, it works when there is a matching local user account.
>>>
>>> do you mean an account in /etc/passwd?  or an account in LDAP?

--
389 users mailing list
389-users@xxxxxxxxxx
https://www.redhat.com/mailman/listinfo/fedora-directory-users

[Index of Archives]     [Fedora Directory Users]     [Fedora Directory Devel]     [Fedora Announce]     [Fedora Legacy Announce]     [Kernel]     [Fedora Legacy]     [Share Photos]     [Fedora Desktop]     [PAM]     [Red Hat Watch]     [Red Hat Development]     [Big List of Linux Books]     [Gimp]     [Yosemite News]

  Powered by Linux