Changeset 311 for branches/samba-3.0/docs/htmldocs/Samba3-HOWTO/pam.html
- Timestamp:
- Aug 5, 2009, 6:33:18 PM (16 years ago)
- File:
-
- 1 edited
Legend:
- Unmodified
- Added
- Removed
-
branches/samba-3.0/docs/htmldocs/Samba3-HOWTO/pam.html
r286 r311 1 <html><head><meta http-equiv="Content-Type" content="text/html; charset=ISO-8859-1"><title>Chapter 28. PAM-Based Distributed Authentication</title><link rel="stylesheet" href="../samba.css" type="text/css"><meta name="generator" content="DocBook XSL Stylesheets V1.74.0"><link rel="home" href="index.html" title="The Official Samba 3. 2.x HOWTO and Reference Guide"><link rel="up" href="optional.html" title="Part III. Advanced Configuration"><link rel="prev" href="ProfileMgmt.html" title="Chapter 27. Desktop Profile Management"><link rel="next" href="integrate-ms-networks.html" title="Chapter 29. Integrating MS Windows Networks with Samba"></head><body bgcolor="white" text="black" link="#0000FF" vlink="#840084" alink="#0000FF"><div class="navheader"><table width="100%" summary="Navigation header"><tr><th colspan="3" align="center">Chapter 28. PAM-Based Distributed Authentication</th></tr><tr><td width="20%" align="left"><a accesskey="p" href="ProfileMgmt.html">Prev</a> </td><th width="60%" align="center">Part III. Advanced Configuration</th><td width="20%" align="right"> <a accesskey="n" href="integrate-ms-networks.html">Next</a></td></tr></table><hr></div><div class="chapter" lang="en"><div class="titlepage"><div><div><h2 class="title"><a name="pam"></a>Chapter 28. PAM-Based Distributed Authentication</h2></div><div><div class="author"><h3 class="author"><span class="firstname">John</span> <span class="othername">H.</span> <span class="orgname">Samba Team</span> <span class="surname">Terpstra</span></h3><div class="affiliation"><span class="orgname">Samba Team<br></span><div class="address"><p><code class="email"><<a class="email" href="mailto:jht@samba.org">jht@samba.org</a>></code></p></div></div></div></div><div><div class="author"><h3 class="author"><span class="firstname">Stephen</span> <span class="surname">Langasek</span></h3><div class="affiliation"><div class="address"><p><code class="email"><<a class="email" href="mailto:vorlon@netexpress.net">vorlon@netexpress.net</a>></code></p></div></div></div></div><div><p class="pubdate">May 31, 2003</p></div></div></div><div class="toc"><p><b>Table of Contents</b></p><dl><dt><span class="sect1"><a href="pam.html#id2665155">Features and Benefits</a></span></dt><dt><span class="sect1"><a href="pam.html#id2665786">Technical Discussion</a></span></dt><dd><dl><dt><span class="sect2"><a href="pam.html#id2665839">PAM Configuration Syntax</a></span></dt><dt><span class="sect2"><a href="pam.html#id2666839">Example System Configurations</a></span></dt><dt><span class="sect2"><a href="pam.html#id2667145">smb.conf PAM Configuration</a></span></dt><dt><span class="sect2"><a href="pam.html#id2667226">Remote CIFS Authentication Using winbindd.so</a></span></dt><dt><span class="sect2"><a href="pam.html#id2667329">Password Synchronization Using pam_smbpass.so</a></span></dt></dl></dd><dt><span class="sect1"><a href="pam.html#id2667723">Common Errors</a></span></dt><dd><dl><dt><span class="sect2"><a href="pam.html#id2667734">pam_winbind Problem</a></span></dt><dt><span class="sect2"><a href="pam.html#id2667832">Winbind Is Not Resolving Users and Groups</a></span></dt></dl></dd></dl></div><p>2 <a class="indexterm" name="id26650 79"></a>3 <a class="indexterm" name="id26650 86"></a>4 <a class="indexterm" name="id26650 93"></a>5 <a class="indexterm" name="id26650 99"></a>1 <html><head><meta http-equiv="Content-Type" content="text/html; charset=ISO-8859-1"><title>Chapter 28. PAM-Based Distributed Authentication</title><link rel="stylesheet" href="../samba.css" type="text/css"><meta name="generator" content="DocBook XSL Stylesheets V1.74.0"><link rel="home" href="index.html" title="The Official Samba 3.0.x HOWTO and Reference Guide"><link rel="up" href="optional.html" title="Part III. Advanced Configuration"><link rel="prev" href="ProfileMgmt.html" title="Chapter 27. Desktop Profile Management"><link rel="next" href="integrate-ms-networks.html" title="Chapter 29. Integrating MS Windows Networks with Samba"></head><body bgcolor="white" text="black" link="#0000FF" vlink="#840084" alink="#0000FF"><div class="navheader"><table width="100%" summary="Navigation header"><tr><th colspan="3" align="center">Chapter 28. PAM-Based Distributed Authentication</th></tr><tr><td width="20%" align="left"><a accesskey="p" href="ProfileMgmt.html">Prev</a> </td><th width="60%" align="center">Part III. Advanced Configuration</th><td width="20%" align="right"> <a accesskey="n" href="integrate-ms-networks.html">Next</a></td></tr></table><hr></div><div class="chapter" lang="en"><div class="titlepage"><div><div><h2 class="title"><a name="pam"></a>Chapter 28. PAM-Based Distributed Authentication</h2></div><div><div class="author"><h3 class="author"><span class="firstname">John</span> <span class="othername">H.</span> <span class="orgname">Samba Team</span> <span class="surname">Terpstra</span></h3><div class="affiliation"><span class="orgname">Samba Team<br></span><div class="address"><p><code class="email"><<a class="email" href="mailto:jht@samba.org">jht@samba.org</a>></code></p></div></div></div></div><div><div class="author"><h3 class="author"><span class="firstname">Stephen</span> <span class="surname">Langasek</span></h3><div class="affiliation"><div class="address"><p><code class="email"><<a class="email" href="mailto:vorlon@netexpress.net">vorlon@netexpress.net</a>></code></p></div></div></div></div><div><p class="pubdate">May 31, 2003</p></div></div></div><div class="toc"><p><b>Table of Contents</b></p><dl><dt><span class="sect1"><a href="pam.html#id2665130">Features and Benefits</a></span></dt><dt><span class="sect1"><a href="pam.html#id2665761">Technical Discussion</a></span></dt><dd><dl><dt><span class="sect2"><a href="pam.html#id2665814">PAM Configuration Syntax</a></span></dt><dt><span class="sect2"><a href="pam.html#id2666814">Example System Configurations</a></span></dt><dt><span class="sect2"><a href="pam.html#id2667120">smb.conf PAM Configuration</a></span></dt><dt><span class="sect2"><a href="pam.html#id2667201">Remote CIFS Authentication Using winbindd.so</a></span></dt><dt><span class="sect2"><a href="pam.html#id2667304">Password Synchronization Using pam_smbpass.so</a></span></dt></dl></dd><dt><span class="sect1"><a href="pam.html#id2667698">Common Errors</a></span></dt><dd><dl><dt><span class="sect2"><a href="pam.html#id2667710">pam_winbind Problem</a></span></dt><dt><span class="sect2"><a href="pam.html#id2667808">Winbind Is Not Resolving Users and Groups</a></span></dt></dl></dd></dl></div><p> 2 <a class="indexterm" name="id2665054"></a> 3 <a class="indexterm" name="id2665061"></a> 4 <a class="indexterm" name="id2665068"></a> 5 <a class="indexterm" name="id2665075"></a> 6 6 This chapter should help you to deploy Winbind-based authentication on any PAM-enabled 7 7 UNIX/Linux system. Winbind can be used to enable user-level application access authentication … … 10 10 controls that are appropriate to your Samba configuration. 11 11 </p><p> 12 <a class="indexterm" name="id2665 117"></a>13 <a class="indexterm" name="id2665 124"></a>12 <a class="indexterm" name="id2665092"></a> 13 <a class="indexterm" name="id2665099"></a> 14 14 In addition to knowing how to configure Winbind into PAM, you will learn generic PAM management 15 15 possibilities and in particular how to deploy tools like <code class="filename">pam_smbpass.so</code> to your advantage. … … 17 17 The use of Winbind requires more than PAM configuration alone. 18 18 Please refer to <a class="link" href="winbind.html" title="Chapter 24. Winbind: Use of Domain Accounts">Winbind: Use of Domain Accounts</a>, for further information regarding Winbind. 19 </p></div><div class="sect1" lang="en"><div class="titlepage"><div><div><h2 class="title" style="clear: both"><a name="id26651 55"></a>Features and Benefits</h2></div></div></div><p>20 <a class="indexterm" name="id26651 63"></a>21 <a class="indexterm" name="id26651 70"></a>22 <a class="indexterm" name="id26651 76"></a>23 <a class="indexterm" name="id26651 83"></a>24 <a class="indexterm" name="id26651 92"></a>25 <a class="indexterm" name="id26651 99"></a>26 <a class="indexterm" name="id2665 206"></a>27 <a class="indexterm" name="id2665 213"></a>19 </p></div><div class="sect1" lang="en"><div class="titlepage"><div><div><h2 class="title" style="clear: both"><a name="id2665130"></a>Features and Benefits</h2></div></div></div><p> 20 <a class="indexterm" name="id2665138"></a> 21 <a class="indexterm" name="id2665145"></a> 22 <a class="indexterm" name="id2665152"></a> 23 <a class="indexterm" name="id2665158"></a> 24 <a class="indexterm" name="id2665168"></a> 25 <a class="indexterm" name="id2665174"></a> 26 <a class="indexterm" name="id2665181"></a> 27 <a class="indexterm" name="id2665188"></a> 28 28 A number of UNIX systems (e.g., Sun Solaris), as well as the xxxxBSD family and Linux, 29 29 now utilize the Pluggable Authentication Modules (PAM) facility to provide all authentication, … … 34 34 <code class="literal">passwd</code>, <code class="literal">chown</code>, and so on. 35 35 </p><p> 36 <a class="indexterm" name="id26652 55"></a>37 <a class="indexterm" name="id26652 61"></a>38 <a class="indexterm" name="id26652 68"></a>39 <a class="indexterm" name="id26652 75"></a>36 <a class="indexterm" name="id2665230"></a> 37 <a class="indexterm" name="id2665236"></a> 38 <a class="indexterm" name="id2665243"></a> 39 <a class="indexterm" name="id2665250"></a> 40 40 PAM provides a mechanism that disconnects these security programs from the underlying 41 41 authentication/authorization infrastructure. PAM is configured by making appropriate modifications to one file, … … 43 43 located in <code class="filename">/etc/pam.d</code>. 44 44 </p><p> 45 <a class="indexterm" name="id2665 301"></a>46 <a class="indexterm" name="id2665 308"></a>45 <a class="indexterm" name="id2665277"></a> 46 <a class="indexterm" name="id2665283"></a> 47 47 On PAM-enabled UNIX/Linux systems, it is an easy matter to configure the system to use any 48 48 authentication backend so long as the appropriate dynamically loadable library modules … … 52 52 PAM support modules are available for: 53 53 </p><div class="variablelist"><dl><dt><span class="term"><code class="filename">/etc/passwd</code></span></dt><dd><p> 54 <a class="indexterm" name="id26653 39"></a>55 <a class="indexterm" name="id26653 45"></a>56 <a class="indexterm" name="id26653 52"></a>57 <a class="indexterm" name="id26653 59"></a>58 <a class="indexterm" name="id26653 66"></a>59 <a class="indexterm" name="id26653 73"></a>54 <a class="indexterm" name="id2665314"></a> 55 <a class="indexterm" name="id2665321"></a> 56 <a class="indexterm" name="id2665327"></a> 57 <a class="indexterm" name="id2665334"></a> 58 <a class="indexterm" name="id2665341"></a> 59 <a class="indexterm" name="id2665348"></a> 60 60 There are several PAM modules that interact with this standard UNIX user database. The most common are called 61 61 <code class="filename">pam_unix.so</code>, <code class="filename">pam_unix2.so</code>, <code class="filename">pam_pwdb.so</code> and 62 62 <code class="filename">pam_userdb.so</code>. 63 63 </p></dd><dt><span class="term">Kerberos</span></dt><dd><p> 64 <a class="indexterm" name="id2665 415"></a>65 <a class="indexterm" name="id2665 422"></a>66 <a class="indexterm" name="id26654 29"></a>67 <a class="indexterm" name="id26654 36"></a>68 <a class="indexterm" name="id26654 43"></a>64 <a class="indexterm" name="id2665390"></a> 65 <a class="indexterm" name="id2665397"></a> 66 <a class="indexterm" name="id2665404"></a> 67 <a class="indexterm" name="id2665411"></a> 68 <a class="indexterm" name="id2665418"></a> 69 69 The <code class="filename">pam_krb5.so</code> module allows the use of any Kerberos-compliant server. 70 70 This tool is used to access MIT Kerberos, Heimdal Kerberos, and potentially 71 71 Microsoft Active Directory (if enabled). 72 72 </p></dd><dt><span class="term">LDAP</span></dt><dd><p> 73 <a class="indexterm" name="id26654 68"></a>74 <a class="indexterm" name="id26654 75"></a>75 <a class="indexterm" name="id26654 82"></a>76 <a class="indexterm" name="id26654 89"></a>77 <a class="indexterm" name="id26654 96"></a>78 <a class="indexterm" name="id2665 503"></a>73 <a class="indexterm" name="id2665443"></a> 74 <a class="indexterm" name="id2665450"></a> 75 <a class="indexterm" name="id2665457"></a> 76 <a class="indexterm" name="id2665464"></a> 77 <a class="indexterm" name="id2665471"></a> 78 <a class="indexterm" name="id2665478"></a> 79 79 The <code class="filename">pam_ldap.so</code> module allows the use of any LDAP v2- or v3-compatible backend 80 80 server. Commonly used LDAP backend servers include OpenLDAP v2.0 and v2.1, 81 81 Sun ONE iDentity server, Novell eDirectory server, and Microsoft Active Directory. 82 82 </p></dd><dt><span class="term">NetWare Bindery</span></dt><dd><p> 83 <a class="indexterm" name="id26655 30"></a>84 <a class="indexterm" name="id26655 37"></a>85 <a class="indexterm" name="id26655 44"></a>86 <a class="indexterm" name="id26655 51"></a>83 <a class="indexterm" name="id2665505"></a> 84 <a class="indexterm" name="id2665512"></a> 85 <a class="indexterm" name="id2665519"></a> 86 <a class="indexterm" name="id2665526"></a> 87 87 The <code class="filename">pam_ncp_auth.so</code> module allows authentication off any bindery-enabled 88 88 NetWare Core Protocol-based server. 89 89 </p></dd><dt><span class="term">SMB Password</span></dt><dd><p> 90 <a class="indexterm" name="id26655 76"></a>91 <a class="indexterm" name="id26655 83"></a>92 <a class="indexterm" name="id26655 90"></a>90 <a class="indexterm" name="id2665551"></a> 91 <a class="indexterm" name="id2665558"></a> 92 <a class="indexterm" name="id2665565"></a> 93 93 This module, called <code class="filename">pam_smbpass.so</code>, allows user authentication of 94 94 the passdb backend that is configured in the Samba <code class="filename">smb.conf</code> file. 95 95 </p></dd><dt><span class="term">SMB Server</span></dt><dd><p> 96 <a class="indexterm" name="id2665 620"></a>97 <a class="indexterm" name="id26656 27"></a>96 <a class="indexterm" name="id2665596"></a> 97 <a class="indexterm" name="id2665602"></a> 98 98 The <code class="filename">pam_smb_auth.so</code> module is the original MS Windows networking authentication 99 99 tool. This module has been somewhat outdated by the Winbind module. 100 100 </p></dd><dt><span class="term">Winbind</span></dt><dd><p> 101 <a class="indexterm" name="id26656 52"></a>102 <a class="indexterm" name="id26656 59"></a>103 <a class="indexterm" name="id26656 66"></a>104 <a class="indexterm" name="id26656 73"></a>101 <a class="indexterm" name="id2665628"></a> 102 <a class="indexterm" name="id2665634"></a> 103 <a class="indexterm" name="id2665641"></a> 104 <a class="indexterm" name="id2665648"></a> 105 105 The <code class="filename">pam_winbind.so</code> module allows Samba to obtain authentication from any 106 106 MS Windows domain controller. It can just as easily be used to authenticate 107 107 users for access to any PAM-enabled application. 108 108 </p></dd><dt><span class="term">RADIUS</span></dt><dd><p> 109 <a class="indexterm" name="id26656 99"></a>109 <a class="indexterm" name="id2665674"></a> 110 110 There is a PAM RADIUS (Remote Access Dial-In User Service) authentication 111 111 module. In most cases, administrators need to locate the source code … … 113 113 used by many routers and terminal servers. 114 114 </p></dd></dl></div><p> 115 <a class="indexterm" name="id2665 719"></a>116 <a class="indexterm" name="id26657 26"></a>115 <a class="indexterm" name="id2665694"></a> 116 <a class="indexterm" name="id2665701"></a> 117 117 Of the modules listed, Samba provides the <code class="filename">pam_smbpasswd.so</code> and the 118 118 <code class="filename">pam_winbind.so</code> modules alone. 119 119 </p><p> 120 <a class="indexterm" name="id26657 49"></a>121 <a class="indexterm" name="id26657 56"></a>122 <a class="indexterm" name="id26657 63"></a>123 <a class="indexterm" name="id26657 70"></a>120 <a class="indexterm" name="id2665724"></a> 121 <a class="indexterm" name="id2665731"></a> 122 <a class="indexterm" name="id2665738"></a> 123 <a class="indexterm" name="id2665745"></a> 124 124 Once configured, these permit a remarkable level of flexibility in the location and use 125 125 of distributed Samba domain controllers that can provide wide-area network bandwidth, … … 127 127 deployment of centrally managed and maintained distributed authentication from a 128 128 single-user account database. 129 </p></div><div class="sect1" lang="en"><div class="titlepage"><div><div><h2 class="title" style="clear: both"><a name="id26657 86"></a>Technical Discussion</h2></div></div></div><p>130 <a class="indexterm" name="id26657 94"></a>131 <a class="indexterm" name="id2665 800"></a>132 <a class="indexterm" name="id2665 807"></a>133 <a class="indexterm" name="id2665 814"></a>129 </p></div><div class="sect1" lang="en"><div class="titlepage"><div><div><h2 class="title" style="clear: both"><a name="id2665761"></a>Technical Discussion</h2></div></div></div><p> 130 <a class="indexterm" name="id2665769"></a> 131 <a class="indexterm" name="id2665775"></a> 132 <a class="indexterm" name="id2665782"></a> 133 <a class="indexterm" name="id2665789"></a> 134 134 PAM is designed to provide system administrators with a great deal of flexibility in 135 135 configuration of the privilege-granting applications of their system. The local … … 137 137 either the single system file <code class="filename">/etc/pam.conf</code> or the 138 138 <code class="filename">/etc/pam.d/</code> directory. 139 </p><div class="sect2" lang="en"><div class="titlepage"><div><div><h3 class="title"><a name="id26658 39"></a>PAM Configuration Syntax</h3></div></div></div><p>140 <a class="indexterm" name="id26658 47"></a>141 <a class="indexterm" name="id26658 54"></a>139 </p><div class="sect2" lang="en"><div class="titlepage"><div><div><h3 class="title"><a name="id2665814"></a>PAM Configuration Syntax</h3></div></div></div><p> 140 <a class="indexterm" name="id2665822"></a> 141 <a class="indexterm" name="id2665829"></a> 142 142 In this section we discuss the correct syntax of and generic options respected by entries to these files. 143 143 PAM-specific tokens in the configuration file are case insensitive. The module paths, however, are case … … 149 149 module specification lines may be extended with a “<span class="quote">\</span>”-escaped newline. 150 150 </p><p> 151 <a class="indexterm" name="id26658 86"></a>152 <a class="indexterm" name="id26658 93"></a>151 <a class="indexterm" name="id2665861"></a> 152 <a class="indexterm" name="id2665868"></a> 153 153 If the PAM authentication module (loadable link library file) is located in the 154 154 default location, then it is not necessary to specify the path. In the case of … … 158 158 auth required /other_path/pam_strange_module.so 159 159 </pre><p> 160 </p><div class="sect3" lang="en"><div class="titlepage"><div><div><h4 class="title"><a name="id2665 918"></a>Anatomy of <code class="filename">/etc/pam.d</code> Entries</h4></div></div></div><p>160 </p><div class="sect3" lang="en"><div class="titlepage"><div><div><h4 class="title"><a name="id2665893"></a>Anatomy of <code class="filename">/etc/pam.d</code> Entries</h4></div></div></div><p> 161 161 The remaining information in this subsection was taken from the documentation of the Linux-PAM 162 162 project. For more information on PAM, see 163 163 <a class="ulink" href="http://ftp.kernel.org/pub/linux/libs/pam/" target="_top">the Official Linux-PAM home page</a>. 164 164 </p><p> 165 <a class="indexterm" name="id26659 44"></a>165 <a class="indexterm" name="id2665919"></a> 166 166 A general configuration line of the <code class="filename">/etc/pam.conf</code> file has the following form: 167 167 </p><pre class="programlisting"> … … 173 173 Once we have explained the meaning of the tokens, we describe this method. 174 174 </p><div class="variablelist"><dl><dt><span class="term">service-name</span></dt><dd><p> 175 <a class="indexterm" name="id26659 89"></a>176 <a class="indexterm" name="id26659 96"></a>177 <a class="indexterm" name="id266 6003"></a>175 <a class="indexterm" name="id2665964"></a> 176 <a class="indexterm" name="id2665971"></a> 177 <a class="indexterm" name="id2665978"></a> 178 178 The name of the service associated with this entry. Frequently, the service-name is the conventional 179 179 name of the given application for example, <code class="literal">ftpd</code>, <code class="literal">rlogind</code> and … … 187 187 One of (currently) four types of module. The four types are as follows: 188 188 </p><div class="itemizedlist"><ul type="disc"><li><p> 189 <a class="indexterm" name="id26660 71"></a>190 <a class="indexterm" name="id26660 78"></a>189 <a class="indexterm" name="id2666046"></a> 190 <a class="indexterm" name="id2666053"></a> 191 191 <em class="parameter"><code>auth:</code></em> This module type provides two aspects of authenticating the user. 192 192 It establishes that the user is who he or she claims to be by instructing the application … … 195 195 or other privileges through its credential-granting properties. 196 196 </p></li><li><p> 197 <a class="indexterm" name="id2666 107"></a>198 <a class="indexterm" name="id2666 114"></a>197 <a class="indexterm" name="id2666082"></a> 198 <a class="indexterm" name="id2666089"></a> 199 199 <em class="parameter"><code>account:</code></em> This module performs non-authentication-based account management. 200 200 It is typically used to restrict/permit access to a service based on the time of day, currently … … 202 202 login. For example, the “<span class="quote">root</span>” login may be permitted only on the console. 203 203 </p></li><li><p> 204 <a class="indexterm" name="id26661 40"></a>204 <a class="indexterm" name="id2666116"></a> 205 205 <em class="parameter"><code>session:</code></em> Primarily, this module is associated with doing things that need 206 206 to be done for the user before and after he or she can be given service. Such things include logging … … 208 208 directories, and so on. 209 209 </p></li><li><p> 210 <a class="indexterm" name="id26661 62"></a>210 <a class="indexterm" name="id2666137"></a> 211 211 <em class="parameter"><code>password:</code></em> This last module type is required for updating the authentication 212 212 token associated with the user. Typically, there is one module for each … … 222 222 As of Linux-PAM v0.60, this control-flag can be defined with one of two syntaxes. 223 223 </p><p> 224 <a class="indexterm" name="id26662 27"></a>225 <a class="indexterm" name="id26662 34"></a>226 <a class="indexterm" name="id26662 40"></a>227 <a class="indexterm" name="id26662 47"></a>224 <a class="indexterm" name="id2666202"></a> 225 <a class="indexterm" name="id2666209"></a> 226 <a class="indexterm" name="id2666216"></a> 227 <a class="indexterm" name="id2666222"></a> 228 228 The simpler (and historical) syntax for the control-flag is a single keyword defined to indicate the 229 229 severity of concern associated with the success or failure of a specific module. There are four such … … 351 351 side of caution) to make the authentication process fail. A corresponding error is written to the system log files 352 352 with a call to syslog(3). 353 </p></dd></dl></div></div></div><div class="sect2" lang="en"><div class="titlepage"><div><div><h3 class="title"><a name="id26668 39"></a>Example System Configurations</h3></div></div></div><p>353 </p></dd></dl></div></div></div><div class="sect2" lang="en"><div class="titlepage"><div><div><h3 class="title"><a name="id2666814"></a>Example System Configurations</h3></div></div></div><p> 354 354 The following is an example <code class="filename">/etc/pam.d/login</code> configuration file. 355 355 This example had all options uncommented and is probably not usable … … 357 357 of the login process. Essentially, all conditions can be disabled 358 358 by commenting them out, except the calls to <code class="filename">pam_pwdb.so</code>. 359 </p><div class="sect3" lang="en"><div class="titlepage"><div><div><h4 class="title"><a name="id26668 65"></a>PAM: Original Login Config</h4></div></div></div><p>359 </p><div class="sect3" lang="en"><div class="titlepage"><div><div><h4 class="title"><a name="id2666840"></a>PAM: Original Login Config</h4></div></div></div><p> 360 360 </p><pre class="programlisting"> 361 361 #%PAM-1.0 … … 374 374 password required pam_pwdb.so shadow md5 375 375 </pre><p> 376 </p></div><div class="sect3" lang="en"><div class="titlepage"><div><div><h4 class="title"><a name="id26668 93"></a>PAM: Login Using <code class="filename">pam_smbpass</code></h4></div></div></div><p>376 </p></div><div class="sect3" lang="en"><div class="titlepage"><div><div><h4 class="title"><a name="id2666868"></a>PAM: Login Using <code class="filename">pam_smbpass</code></h4></div></div></div><p> 377 377 PAM allows use of replaceable modules. Those available on a sample system include: 378 378 </p><p><code class="prompt">$</code><strong class="userinput"><code>/bin/ls /lib/security</code></strong> … … 457 457 life, though, every decision has trade-offs, so you may want to examine the 458 458 PAM documentation for further helpful information. 459 </p></div></div></div><div class="sect2" lang="en"><div class="titlepage"><div><div><h3 class="title"><a name="id26671 45"></a><code class="filename">smb.conf</code> PAM Configuration</h3></div></div></div><p>459 </p></div></div></div><div class="sect2" lang="en"><div class="titlepage"><div><div><h3 class="title"><a name="id2667120"></a><code class="filename">smb.conf</code> PAM Configuration</h3></div></div></div><p> 460 460 There is an option in <code class="filename">smb.conf</code> called <a class="link" href="smb.conf.5.html#OBEYPAMRESTRICTIONS" target="_top">obey pam restrictions</a>. 461 461 The following is from the online help for this option in SWAT: … … 467 467 The reason is that PAM modules cannot support the challenge/response authentication mechanism needed in the presence of SMB 468 468 password encryption. 469 </p><p>Default: <a class="link" href="smb.conf.5.html#OBEYPAMRESTRICTIONS" target="_top">obey pam restrictions = no</a></p></blockquote></div></div><div class="sect2" lang="en"><div class="titlepage"><div><div><h3 class="title"><a name="id26672 26"></a>Remote CIFS Authentication Using <code class="filename">winbindd.so</code></h3></div></div></div><p>469 </p><p>Default: <a class="link" href="smb.conf.5.html#OBEYPAMRESTRICTIONS" target="_top">obey pam restrictions = no</a></p></blockquote></div></div><div class="sect2" lang="en"><div class="titlepage"><div><div><h3 class="title"><a name="id2667201"></a>Remote CIFS Authentication Using <code class="filename">winbindd.so</code></h3></div></div></div><p> 470 470 All operating systems depend on the provision of user credentials acceptable to the platform. 471 471 UNIX requires the provision of a user identifier (UID) as well as a group identifier (GID). … … 494 494 stored by <code class="literal">winbindd</code>. If this file is deleted or corrupted, there is no way for <code class="literal">winbindd</code> 495 495 to determine which user and group IDs correspond to Windows NT user and group RIDs. 496 </p></div></div><div class="sect2" lang="en"><div class="titlepage"><div><div><h3 class="title"><a name="id26673 29"></a>Password Synchronization Using <code class="filename">pam_smbpass.so</code></h3></div></div></div><p>496 </p></div></div><div class="sect2" lang="en"><div class="titlepage"><div><div><h3 class="title"><a name="id2667304"></a>Password Synchronization Using <code class="filename">pam_smbpass.so</code></h3></div></div></div><p> 497 497 <code class="filename">pam_smbpass</code> is a PAM module that can be used on conforming systems to 498 498 keep the <code class="filename">smbpasswd</code> (Samba password) database in sync with the UNIX … … 512 512 <code class="filename">/etc/pam.d/</code> files structure. Those wishing to implement this 513 513 tool on other platforms will need to adapt this appropriately. 514 </p><div class="sect3" lang="en"><div class="titlepage"><div><div><h4 class="title"><a name="id26675 48"></a>Password Synchronization Configuration</h4></div></div></div><p>514 </p><div class="sect3" lang="en"><div class="titlepage"><div><div><h4 class="title"><a name="id2667524"></a>Password Synchronization Configuration</h4></div></div></div><p> 515 515 The following is a sample PAM configuration that shows the use of pam_smbpass to make 516 516 sure <code class="filename">private/smbpasswd</code> is kept in sync when <code class="filename">/etc/passwd (/etc/shadow)</code> … … 529 529 password required pam_smbpass.so nullok use_authtok try_first_pass 530 530 session required pam_unix.so 531 </pre></div><div class="sect3" lang="en"><div class="titlepage"><div><div><h4 class="title"><a name="id26675 94"></a>Password Migration Configuration</h4></div></div></div><p>531 </pre></div><div class="sect3" lang="en"><div class="titlepage"><div><div><h4 class="title"><a name="id2667569"></a>Password Migration Configuration</h4></div></div></div><p> 532 532 The following PAM configuration shows the use of <code class="filename">pam_smbpass</code> to migrate 533 533 from plaintext to encrypted passwords for Samba. Unlike other methods, … … 549 549 password optional pam_smbpass.so nullok use_authtok try_first_pass 550 550 session required pam_unix.so 551 </pre></div><div class="sect3" lang="en"><div class="titlepage"><div><div><h4 class="title"><a name="id26676 42"></a>Mature Password Configuration</h4></div></div></div><p>551 </pre></div><div class="sect3" lang="en"><div class="titlepage"><div><div><h4 class="title"><a name="id2667618"></a>Mature Password Configuration</h4></div></div></div><p> 552 552 The following is a sample PAM configuration for a mature <code class="filename">smbpasswd</code> installation. 553 553 <code class="filename">private/smbpasswd</code> is fully populated, and we consider it an error if … … 565 565 password required pam_smbpass.so use_authtok use_first_pass 566 566 session required pam_unix.so 567 </pre></div><div class="sect3" lang="en"><div class="titlepage"><div><div><h4 class="title"><a name="id26676 82"></a>Kerberos Password Integration Configuration</h4></div></div></div><p>567 </pre></div><div class="sect3" lang="en"><div class="titlepage"><div><div><h4 class="title"><a name="id2667657"></a>Kerberos Password Integration Configuration</h4></div></div></div><p> 568 568 The following is a sample PAM configuration that shows <em class="parameter"><code>pam_smbpass</code></em> used together with 569 569 <em class="parameter"><code>pam_krb5</code></em>. This could be useful on a Samba PDC that is also a member of … … 582 582 password required pam_krb5.so use_authtok try_first_pass 583 583 session required pam_krb5.so 584 </pre></div></div></div><div class="sect1" lang="en"><div class="titlepage"><div><div><h2 class="title" style="clear: both"><a name="id2667 723"></a>Common Errors</h2></div></div></div><p>584 </pre></div></div></div><div class="sect1" lang="en"><div class="titlepage"><div><div><h2 class="title" style="clear: both"><a name="id2667698"></a>Common Errors</h2></div></div></div><p> 585 585 PAM can be fickle and sensitive to configuration glitches. Here we look at a few cases from 586 586 the Samba mailing list. 587 </p><div class="sect2" lang="en"><div class="titlepage"><div><div><h3 class="title"><a name="id26677 34"></a>pam_winbind Problem</h3></div></div></div><p>587 </p><div class="sect2" lang="en"><div class="titlepage"><div><div><h3 class="title"><a name="id2667710"></a>pam_winbind Problem</h3></div></div></div><p> 588 588 A user reported, <span class="emphasis"><em>I have the following PAM configuration</em></span>: 589 589 </p><p> … … 609 609 <code class="filename">/etc/pam.d/login</code> file. Alternatively, if you want all services to use 610 610 Winbind, you can put the Winbind-specific stuff in <code class="filename">/etc/pam.d/system-auth</code>. 611 </p></div><div class="sect2" lang="en"><div class="titlepage"><div><div><h3 class="title"><a name="id26678 32"></a>Winbind Is Not Resolving Users and Groups</h3></div></div></div><p>611 </p></div><div class="sect2" lang="en"><div class="titlepage"><div><div><h3 class="title"><a name="id2667808"></a>Winbind Is Not Resolving Users and Groups</h3></div></div></div><p> 612 612 “<span class="quote"> 613 613 My <code class="filename">smb.conf</code> file is correctly configured. I have specified
Note:
See TracChangeset
for help on using the changeset viewer.