Bug 1301072
Summary: | SSSD Smart Card support requires manual PAM configuration | ||
---|---|---|---|
Product: | Red Hat Enterprise Linux 6 | Reporter: | Martin Kosek <mkosek> |
Component: | doc-Identity_Management_Guide | Assignee: | Aneta Šteflová Petrová <apetrova> |
Status: | CLOSED CURRENTRELEASE | QA Contact: | Namita Soman <nsoman> |
Severity: | unspecified | Docs Contact: | |
Priority: | unspecified | ||
Version: | 6.7 | CC: | benl, bressers, jmagne, ksrot, kwaldron, mkosek, pkis, qe-baseos-security, rhel-docs, rpattath, sbose, tmraz |
Target Milestone: | rc | Keywords: | Documentation, FutureFeature |
Target Release: | --- | ||
Hardware: | Unspecified | ||
OS: | Unspecified | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | Enhancement | |
Doc Text: | Story Points: | --- | |
Clone Of: | 1297034 | Environment: | |
Last Closed: | 2016-05-11 07:08:29 UTC | Type: | Bug |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 1297034 | ||
Bug Blocks: | 1270027 |
Description
Martin Kosek
2016-01-22 14:15:21 UTC
The auth section of the default /etc/pam.d/password-auth and /etc/pam.d/system-auth must be modified to allow SSSD to prompt for password or OTP or PIN for non-local users. Default /etc/pam.d/password-auth: ... auth required pam_env.so auth sufficient pam_unix.so nullok try_first_pass auth requisite pam_succeed_if.so uid >= 500 quiet auth sufficient pam_sss.so use_first_pass auth required pam_deny.so ... New /etc/pam.d/password-auth: ... auth required pam_env.so auth [default=1 success=ok] pam_localuser.so auth [success=done ignore=ignore default=die] pam_unix.so nullok try_first_pass auth requisite pam_succeed_if.so uid >= 500 quiet auth sufficient pam_sss.so forward_pass auth required pam_deny.so ... The same changes must be applied to /etc/pam.d/system-auth. Default /etc/pam.d/system-auth: ... auth required pam_env.so auth sufficient pam_unix.so nullok try_first_pass auth requisite pam_succeed_if.so uid >= 500 quiet auth sufficient pam_sss.so use_first_pass auth required pam_deny.so ... New /etc/pam.d/system-auth: ... auth required pam_env.so auth [default=1 success=ok] pam_localuser.so auth [success=done ignore=ignore default=die] pam_unix.so nullok try_first_pass auth requisite pam_succeed_if.so uid >= 500 quiet auth sufficient pam_sss.so forward_pass auth required pam_deny.so ... Documented in the Identity Management Guide - "9.7.1. Configuring Smart Card Authentication on an IdM Client". |