Bug 1301072

Summary: SSSD Smart Card support requires manual PAM configuration
Product: Red Hat Enterprise Linux 6 Reporter: Martin Kosek <mkosek>
Component: doc-Identity_Management_GuideAssignee: Aneta Šteflová Petrová <apetrova>
Status: CLOSED CURRENTRELEASE QA Contact: Namita Soman <nsoman>
Severity: unspecified Docs Contact:
Priority: unspecified    
Version: 6.7CC: benl, bressers, jmagne, ksrot, kwaldron, mkosek, pkis, qe-baseos-security, rhel-docs, rpattath, sbose, tmraz
Target Milestone: rcKeywords: Documentation, FutureFeature
Target Release: ---   
Hardware: Unspecified   
OS: Unspecified   
Whiteboard:
Fixed In Version: Doc Type: Enhancement
Doc Text:
Story Points: ---
Clone Of: 1297034 Environment:
Last Closed: 2016-05-11 07:08:29 UTC Type: Bug
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 1297034    
Bug Blocks: 1270027    

Description Martin Kosek 2016-01-22 14:15:21 UTC
See the details below, manual PAM configuration will be required in RHEL-6.8, to support the SSSD Smart Card feature.

+++ This bug was initially created as a clone of Bug #1297034 +++

Description of problem:

SSSD in 6.8 will have all the recent features like smart 2-factor authentication prompting and Smartcard PIN prompting.

To make those features visible to the user the changes from https://bugzilla.redhat.com/show_bug.cgi?id=1204864 are needed for 6.8 as well.

It would be nice if they changes can be backported to 6.8. If not the documentation has to be extended to explain how to do the changes manually.

...
--- Additional comment from Martin Kosek on 2016-01-22 09:12:23 EST ---

Based on the PM input and given that we are rather late in the RHEL-6 cycle, we have decided to close the request as WONTFIX. Users requiring Smart Card support in SSSD will need to manually change PAM configuration to enable it (or move to RHEL-7.2+).

I will open a doc bug, to note the required PAM changes in official docs.

Comment 1 Sumit Bose 2016-01-28 20:20:49 UTC
The auth section of the default /etc/pam.d/password-auth and /etc/pam.d/system-auth must be modified to allow SSSD to prompt for password or OTP or PIN for non-local users.

Default /etc/pam.d/password-auth:
...
auth        required      pam_env.so
auth        sufficient    pam_unix.so nullok try_first_pass
auth        requisite     pam_succeed_if.so uid >= 500 quiet
auth        sufficient    pam_sss.so use_first_pass
auth        required      pam_deny.so
...

New /etc/pam.d/password-auth:
...
auth        required      pam_env.so
auth        [default=1 success=ok] pam_localuser.so
auth        [success=done ignore=ignore default=die] pam_unix.so nullok try_first_pass
auth        requisite     pam_succeed_if.so uid >= 500 quiet
auth        sufficient    pam_sss.so forward_pass
auth        required      pam_deny.so
...

The same changes must be applied to /etc/pam.d/system-auth.

Default /etc/pam.d/system-auth:
...
auth        required      pam_env.so
auth        sufficient    pam_unix.so nullok try_first_pass
auth        requisite     pam_succeed_if.so uid >= 500 quiet
auth        sufficient    pam_sss.so use_first_pass
auth        required      pam_deny.so
...

New /etc/pam.d/system-auth:
...
auth        required      pam_env.so
auth        [default=1 success=ok] pam_localuser.so
auth        [success=done ignore=ignore default=die] pam_unix.so nullok try_first_pass
auth        requisite     pam_succeed_if.so uid >= 500 quiet
auth        sufficient    pam_sss.so forward_pass
auth        required      pam_deny.so
...

Comment 2 Aneta Šteflová Petrová 2016-04-22 08:18:44 UTC
Documented in the Identity Management Guide - "9.7.1. Configuring Smart Card Authentication on an IdM Client".