2
Add a new authentication method.
Adding a new authentication method
(for example, LDAP) to your stack of PAM modules comes down to a simple
pam-config --add --ldap
command. LDAP is added wherever appropri-
ate across all
common-*-pc
PAM configuration files.
3
Add debugging for test purposes.
To make sure the new authentication
procedure works as planned, turn on debugging for all PAM-related operations.
The
pam-config --add --ldap-debug
turns on debugging for LDAP-
related PAM operations. Find the debugging output in
/var/log/messages
.
4
Query your setup.
Before you finally apply your new PAM setup, check
whether it contains all the options you planned to add. The
pam-config
--query --
module
lists both the type and the options for the queried PAM
module.
5
Remove the debug options.
Finally, remove the debug option from your
setup when you are entirely satisfied with the performance of it. The
pam-config --delete --ldap-debug
turns of debugging for LDAP
authentication. In case you had debugging options added for other modules, use
similar commands to turn these off.
When you create your PAM configuration files from scratch using the
pam-config
--create
command, it creates symbolic links from the
common-*
to the
common-*-pc
files. pam-config only modifies the
common-*-pc
configuration
files. Removing these symbolic links effectively disable pam-config, because pam-
config only operates on the
common-*-pc
files and these files are not put into effect
without the symbolic links.
For more information on the
pam-config
command and the options available, refer
to the manual page of
pam-config
,
pam-config(8)
.
Authentication with PAM
25
Summary of Contents for LINUX ENTERPRISE DESKTOP 11
Page 1: ...SUSE Linux Enterprise Server www novell com 11 March 17 2009 Security Guide...
Page 9: ...32 7 Managing Audit Event Records Using Keys 433 33 Useful Resources 435...
Page 10: ......
Page 29: ...Part I Authentication...
Page 30: ......
Page 55: ...Figure 4 2 YaST LDAP Server Configuration LDAP A Directory Service 41...
Page 126: ......
Page 127: ...Part II Local Security...
Page 128: ......
Page 158: ......
Page 173: ...Part III Network Security...
Page 174: ......
Page 194: ......
Page 197: ...Figure 16 2 Scenario 2 Figure 16 3 Scenario 3 Configuring VPN Server 183...
Page 210: ......
Page 228: ......
Page 229: ...Part IV Confining Privileges with Novell AppArmor...
Page 230: ......
Page 274: ......
Page 300: ......
Page 328: ......
Page 340: ......
Page 342: ......
Page 386: ......
Page 387: ...Part V The Linux Audit Framework...
Page 388: ......