Bug 1301072 - SSSD Smart Card support requires manual PAM configuration
Summary: SSSD Smart Card support requires manual PAM configuration
Keywords:
Status: CLOSED CURRENTRELEASE
Alias: None
Product: Red Hat Enterprise Linux 6
Classification: Red Hat
Component: doc-Identity_Management_Guide
Version: 6.7
Hardware: Unspecified
OS: Unspecified
unspecified
unspecified
Target Milestone: rc
: ---
Assignee: Aneta Šteflová Petrová
QA Contact: Namita Soman
URL:
Whiteboard:
Depends On: 1297034
Blocks: 1270027
TreeView+ depends on / blocked
 
Reported: 2016-01-22 14:15 UTC by Martin Kosek
Modified: 2016-05-11 07:08 UTC (History)
12 users (show)

Fixed In Version:
Doc Type: Enhancement
Doc Text:
Clone Of: 1297034
Environment:
Last Closed: 2016-05-11 07:08:29 UTC
Target Upstream Version:


Attachments (Terms of Use)

Description Martin Kosek 2016-01-22 14:15:21 UTC
See the details below, manual PAM configuration will be required in RHEL-6.8, to support the SSSD Smart Card feature.

+++ This bug was initially created as a clone of Bug #1297034 +++

Description of problem:

SSSD in 6.8 will have all the recent features like smart 2-factor authentication prompting and Smartcard PIN prompting.

To make those features visible to the user the changes from https://bugzilla.redhat.com/show_bug.cgi?id=1204864 are needed for 6.8 as well.

It would be nice if they changes can be backported to 6.8. If not the documentation has to be extended to explain how to do the changes manually.

...
--- Additional comment from Martin Kosek on 2016-01-22 09:12:23 EST ---

Based on the PM input and given that we are rather late in the RHEL-6 cycle, we have decided to close the request as WONTFIX. Users requiring Smart Card support in SSSD will need to manually change PAM configuration to enable it (or move to RHEL-7.2+).

I will open a doc bug, to note the required PAM changes in official docs.

Comment 1 Sumit Bose 2016-01-28 20:20:49 UTC
The auth section of the default /etc/pam.d/password-auth and /etc/pam.d/system-auth must be modified to allow SSSD to prompt for password or OTP or PIN for non-local users.

Default /etc/pam.d/password-auth:
...
auth        required      pam_env.so
auth        sufficient    pam_unix.so nullok try_first_pass
auth        requisite     pam_succeed_if.so uid >= 500 quiet
auth        sufficient    pam_sss.so use_first_pass
auth        required      pam_deny.so
...

New /etc/pam.d/password-auth:
...
auth        required      pam_env.so
auth        [default=1 success=ok] pam_localuser.so
auth        [success=done ignore=ignore default=die] pam_unix.so nullok try_first_pass
auth        requisite     pam_succeed_if.so uid >= 500 quiet
auth        sufficient    pam_sss.so forward_pass
auth        required      pam_deny.so
...

The same changes must be applied to /etc/pam.d/system-auth.

Default /etc/pam.d/system-auth:
...
auth        required      pam_env.so
auth        sufficient    pam_unix.so nullok try_first_pass
auth        requisite     pam_succeed_if.so uid >= 500 quiet
auth        sufficient    pam_sss.so use_first_pass
auth        required      pam_deny.so
...

New /etc/pam.d/system-auth:
...
auth        required      pam_env.so
auth        [default=1 success=ok] pam_localuser.so
auth        [success=done ignore=ignore default=die] pam_unix.so nullok try_first_pass
auth        requisite     pam_succeed_if.so uid >= 500 quiet
auth        sufficient    pam_sss.so forward_pass
auth        required      pam_deny.so
...

Comment 2 Aneta Šteflová Petrová 2016-04-22 08:18:44 UTC
Documented in the Identity Management Guide - "9.7.1. Configuring Smart Card Authentication on an IdM Client".


Note You need to log in before you can comment on or make changes to this bug.