2
Add a new authentication method.
Adding a new authentication method
(for example, LDAP) to your stack of PAM modules comes down to a simple
pam-config --add --ldap
command. LDAP is added wherever appropri-
ate across all
common-*-pc
PAM configuration files.
3
Add debugging for test purposes.
To make sure the new authentication
procedure works as planned, turn on debugging for all PAM-related operations.
The
pam-config --add --ldap-debug
turns on debugging for LDAP-
related PAM operations. Find the debugging output in
/var/log/messages
.
4
Query your setup.
Before you finally apply your new PAM setup, check
whether it contains all the options you planned to add. The
pam-config
--query --
module
lists both the type and the options for the queried PAM
module.
5
Remove the debug options.
Finally, remove the debug option from your
setup when you are entirely satisfied with the performance of it. The
pam-config --delete --ldap-debug
turns of debugging for LDAP
authentication. In case you had debugging options added for other modules, use
similar commands to turn these off.
When you create your PAM configuration files from scratch using the
pam-config
--create
command, it creates symbolic links from the
common-*
to the
common-*-pc
files. pam-config only modifies the
common-*-pc
configuration
files. Removing these symbolic links effectively disable pam-config, because pam-
config only operates on the
common-*-pc
files and these files are not put into effect
without the symbolic links.
For more information on the
pam-config
command and the options available, refer
to the manual page of
pam-config
,
pam-config(8)
.
Authentication with PAM
25
Содержание LINUX ENTERPRISE DESKTOP 11
Страница 1: ...SUSE Linux Enterprise Server www novell com 11 March 17 2009 Security Guide...
Страница 9: ...32 7 Managing Audit Event Records Using Keys 433 33 Useful Resources 435...
Страница 10: ......
Страница 29: ...Part I Authentication...
Страница 30: ......
Страница 55: ...Figure 4 2 YaST LDAP Server Configuration LDAP A Directory Service 41...
Страница 126: ......
Страница 127: ...Part II Local Security...
Страница 128: ......
Страница 158: ......
Страница 173: ...Part III Network Security...
Страница 174: ......
Страница 194: ......
Страница 197: ...Figure 16 2 Scenario 2 Figure 16 3 Scenario 3 Configuring VPN Server 183...
Страница 210: ......
Страница 228: ......
Страница 229: ...Part IV Confining Privileges with Novell AppArmor...
Страница 230: ......
Страница 274: ......
Страница 300: ......
Страница 328: ......
Страница 340: ......
Страница 342: ......
Страница 386: ......
Страница 387: ...Part V The Linux Audit Framework...
Страница 388: ......