[Date Prev][Date Next]   [Thread Prev][Thread Next]   [Thread Index] [Date Index] [Author Index]

User Auth with PAM and LDAP


I have stored my user accounts in an LDAP database and for some reason there are
still some users in /etc/passwd.
Now I would like to let both types of users have access to certain linux boxes
via ssh.
In my /etc/pam.d/sshd I have the following lines:

auth     sufficient     /lib/security/pam_ldap.so
auth     required       /lib/security/pam_unix.so       # set_secrpc
auth     required       /lib/security/pam_nologin.so
auth     required       /lib/security/pam_env.so
auth     required       /lib/security/pam_mail.so
account  sufficient     /lib/security/pam_ldap.so
account  required       /lib/security/pam_unix.so
password required       /lib/security/pam_pwcheck.so
password required       /lib/security/pam_unix.so       use_first_pass
password sufficient     /lib/security/pam_ldap.so
session  required       /lib/security/pam_unix.so       none # trace or debug
session  required       /lib/security/pam_limits.so

This way it works fine, but additionally I would like to restrict the access of
users only to certain hosts using the
"host" attribute in ldap where the accessible hosts are listed. But with the
above configuration this won't work,
the user can access any host, even if not listed in the ldap database (yes I use
"pam_check_host_attr=yes" in
my ldap configuration). If I change the "auth sufficient
/lib/security/pam_ldap.so" into "auth required...", the host attribute
is checked but now the "/etc/passwd"-users cannot login at all.

Any ideas or hints are greatly appreciated...

mit freundlichen Grüßen/with best regards
Thomas Emde
ScaleOn GmbH & Co. KG
Systems Engineering 1
Geb. B151, Raum 117
D-51368 Leverkusen
Telefon     +49 214/30-67603
Telefax     +49 214/30-24887
E-Mail      thomas.emde@scaleon.de
Internet    http://www.scaleon.de

[Date Prev][Date Next]   [Thread Prev][Thread Next]   [Thread Index] [Date Index] [Author Index] []