[Bug 217415] security/sssd Cannot authenticate towards Active Directory
bugzilla-noreply at freebsd.org
bugzilla-noreply at freebsd.org
Fri Mar 10 09:18:39 UTC 2017
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=217415
--- Comment #19 from Karli Sjöberg <Karli.Sjoberg at slu.se> ---
(In reply to lukas.slebodnik from comment #18)
Don´t apologize, nobody is forcing you to do this, besides...
IT WORKS!!! :)
The second example you posted of using pam_deny.so as required at the end does
not work, however I recalled reading something about using pam_unix.so, both
before _and_ after sssd to mimic this behaviour. For posterity, I´ll just paste
my working examples, that lets both local and directory users log in when sssd
is running, and local users when sssd is turned off:
/etc/pam.d/system:
#
# $FreeBSD: releng/10.3/etc/pam.d/system 197769 2009-10-05 09:28:54Z des $
#
# System-wide defaults
#
# auth
auth sufficient pam_opie.so no_warn no_fake_prompts
auth requisite pam_opieaccess.so no_warn allow_local
#auth sufficient pam_krb5.so no_warn try_first_pass
#auth sufficient pam_ssh.so no_warn try_first_pass
auth sufficient pam_unix.so no_warn try_first_pass
auth sufficient /usr/local/lib/pam_sss.so use_first_pass
auth required pam_unix.so no_warn try_first_pass
# account
#account required pam_krb5.so
account sufficient /usr/local/lib/pam_sss.so
ignore_unknown_user
account required pam_login_access.so
account required pam_unix.so
# session
#session optional pam_ssh.so want_agent
session required /usr/local/lib/pam_mkhomedir.so mode=0700
session required pam_lastlog.so no_fail
# password
#password sufficient pam_krb5.so no_warn try_first_pass
password sufficient /usr/local/lib/pam_sss.so use_authtok
password required pam_unix.so no_warn try_first_pass
/etc/pam.d/sshd:
#
# $FreeBSD: releng/10.3/etc/pam.d/sshd 197769 2009-10-05 09:28:54Z des $
#
# PAM configuration for the "sshd" service
#
# auth
auth sufficient pam_opie.so no_warn no_fake_prompts
auth requisite pam_opieaccess.so no_warn allow_local
#auth sufficient pam_krb5.so no_warn try_first_pass
#auth sufficient pam_ssh.so no_warn try_first_pass
auth sufficient pam_unix.so no_warn try_first_pass
auth sufficient /usr/local/lib/pam_sss.so use_first_pass
auth required pam_unix.so no_warn try_first_pass
# account
account required pam_nologin.so
#account required pam_krb5.so
account required pam_login_access.so
account sufficient /usr/local/lib/pam_sss.so
ignore_unknown_user
account required pam_unix.so
# session
#session optional pam_ssh.so want_agent
session required /usr/local/lib/pam_mkhomedir.so mode=0700
session required pam_permit.so
# password
#password sufficient pam_krb5.so no_warn try_first_pass
password sufficient /usr/local/lib/pam_sss.so use_authtok
password required pam_unix.so no_warn try_first_pass
Best Regards
Karli Sjöberg
--
You are receiving this mail because:
You are the assignee for the bug.
More information about the freebsd-ports-bugs
mailing list