13.07.2015 Views

Naming and Directory Services (DNS, NIS, and LDAP)

Naming and Directory Services (DNS, NIS, and LDAP)

Naming and Directory Services (DNS, NIS, and LDAP)

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Configuring PAMpam_ldap is the authentication <strong>and</strong> account management PAM module for <strong>LDAP</strong>. Seethe pam_ldap(5) man page <strong>and</strong> Appendix A for more information about the featurescurrently supported with pam_ldap.Configuring PAM to Use UNIX policyTo configure PAM to use UNIX policy, follow the sample in “Example pam.confFile for pam_ldap” on page 199. Add the lines that contain pam_ldap.so.1 to theclient’s /etc/pam.conf file. For details, see the pam.conf(4) man page.Configuring PAM to Use <strong>LDAP</strong> server_policyTo configure PAM to use <strong>LDAP</strong> server_policy, follow the sample in “Examplepam_conf file for pam_ldap Configured for Account Management” on page 201. Addthe lines that contain pam_ldap.so.1 to the client’s /etc/pam.conf file. Inaddition, if any PAM module in the sample pam.conf file specifies the binding flag<strong>and</strong> the server_policy option, use the same flag <strong>and</strong> option for the correspondingmodule in the client’s /etc/pam.conf file. Also, add the server_policy option tothe line that contains the service module pam_authtok_store.so.1.Note – After you enable pam_ldap account management, all users must provide apassword any time they log in to the system. A login password is required forauthentication. Therefore, nonpassword-based logins using tools such as rsh,rlogin, orssh will fail.■■The binding control flagUsing the binding control flag allows a local password override of a remote(<strong>LDAP</strong>) password. For example, if a user account is found on both the local files<strong>and</strong> the <strong>LDAP</strong> namespace, the password associated with the local account takesprecedence over the remote password. Thus, if the local password expires,authentication fails even if the remote <strong>LDAP</strong> password is still valid.The server_policy optionThe server_policy option instructs pam_unix_auth, pam_unix_account,<strong>and</strong> pam_passwd_auth to ignore a user found in the <strong>LDAP</strong> namespace <strong>and</strong> toallow pam_ldap to perform authentication or account validation. In the case ofpam_authtok_store, a new password is passed to the <strong>LDAP</strong> server withoutencryption. The password is thereby stored in the directory according to thepassword encryption scheme configured on the server. For more information, seepam.conf(4) <strong>and</strong> pam_ldap(5).184 System Administration Guide: <strong>Naming</strong> <strong>and</strong> <strong>Directory</strong> <strong>Services</strong> (<strong>DNS</strong>, <strong>NIS</strong>, <strong>and</strong> <strong>LDAP</strong>) • January 2005

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!