Note: This bug is displayed in read-only format because the product is no longer active in Red Hat Bugzilla.
RHEL Engineering is moving the tracking of its product development work on RHEL 6 through RHEL 9 to Red Hat Jira (issues.redhat.com). If you're a Red Hat customer, please continue to file support cases via the Red Hat customer portal. If you're not, please head to the "RHEL project" in Red Hat Jira and file new tickets here. Individual Bugzilla bugs in the statuses "NEW", "ASSIGNED", and "POST" are being migrated throughout September 2023. Bugs of Red Hat partners with an assigned Engineering Partner Manager (EPM) are migrated in late September as per pre-agreed dates. Bugs against components "kernel", "kernel-rt", and "kpatch" are only migrated if still in "NEW" or "ASSIGNED". If you cannot log in to RH Jira, please consult article #7032570. That failing, please send an e-mail to the RH Jira admins at rh-issues@redhat.com to troubleshoot your issue as a user management inquiry. The email creates a ServiceNow ticket with Red Hat. Individual Bugzilla bugs that are migrated will be moved to status "CLOSED", resolution "MIGRATED", and set with "MigratedToJIRA" in "Keywords". The link to the successor Jira issue will be found under "Links", have a little "two-footprint" icon next to it, and direct you to the "RHEL project" in Red Hat Jira (issue links are of type "https://issues.redhat.com/browse/RHEL-XXXX", where "X" is a digit). This same link will be available in a blue banner at the top of the page informing you that that bug has been migrated.

Bug 1301072

Summary: SSSD Smart Card support requires manual PAM configuration
Product: Red Hat Enterprise Linux 6 Reporter: Martin Kosek <mkosek>
Component: doc-Identity_Management_GuideAssignee: Aneta Šteflová Petrová <apetrova>
Status: CLOSED CURRENTRELEASE QA Contact: Namita Soman <nsoman>
Severity: unspecified Docs Contact:
Priority: unspecified    
Version: 6.7CC: benl, bressers, jmagne, ksrot, kwaldron, mkosek, pkis, qe-baseos-security, rhel-docs, rpattath, sbose, tmraz
Target Milestone: rcKeywords: Documentation, FutureFeature
Target Release: ---   
Hardware: Unspecified   
OS: Unspecified   
Whiteboard:
Fixed In Version: Doc Type: Enhancement
Doc Text:
Story Points: ---
Clone Of: 1297034 Environment:
Last Closed: 2016-05-11 07:08:29 UTC Type: Bug
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 1297034    
Bug Blocks: 1270027    

Description Martin Kosek 2016-01-22 14:15:21 UTC
See the details below, manual PAM configuration will be required in RHEL-6.8, to support the SSSD Smart Card feature.

+++ This bug was initially created as a clone of Bug #1297034 +++

Description of problem:

SSSD in 6.8 will have all the recent features like smart 2-factor authentication prompting and Smartcard PIN prompting.

To make those features visible to the user the changes from https://bugzilla.redhat.com/show_bug.cgi?id=1204864 are needed for 6.8 as well.

It would be nice if they changes can be backported to 6.8. If not the documentation has to be extended to explain how to do the changes manually.

...
--- Additional comment from Martin Kosek on 2016-01-22 09:12:23 EST ---

Based on the PM input and given that we are rather late in the RHEL-6 cycle, we have decided to close the request as WONTFIX. Users requiring Smart Card support in SSSD will need to manually change PAM configuration to enable it (or move to RHEL-7.2+).

I will open a doc bug, to note the required PAM changes in official docs.

Comment 1 Sumit Bose 2016-01-28 20:20:49 UTC
The auth section of the default /etc/pam.d/password-auth and /etc/pam.d/system-auth must be modified to allow SSSD to prompt for password or OTP or PIN for non-local users.

Default /etc/pam.d/password-auth:
...
auth        required      pam_env.so
auth        sufficient    pam_unix.so nullok try_first_pass
auth        requisite     pam_succeed_if.so uid >= 500 quiet
auth        sufficient    pam_sss.so use_first_pass
auth        required      pam_deny.so
...

New /etc/pam.d/password-auth:
...
auth        required      pam_env.so
auth        [default=1 success=ok] pam_localuser.so
auth        [success=done ignore=ignore default=die] pam_unix.so nullok try_first_pass
auth        requisite     pam_succeed_if.so uid >= 500 quiet
auth        sufficient    pam_sss.so forward_pass
auth        required      pam_deny.so
...

The same changes must be applied to /etc/pam.d/system-auth.

Default /etc/pam.d/system-auth:
...
auth        required      pam_env.so
auth        sufficient    pam_unix.so nullok try_first_pass
auth        requisite     pam_succeed_if.so uid >= 500 quiet
auth        sufficient    pam_sss.so use_first_pass
auth        required      pam_deny.so
...

New /etc/pam.d/system-auth:
...
auth        required      pam_env.so
auth        [default=1 success=ok] pam_localuser.so
auth        [success=done ignore=ignore default=die] pam_unix.so nullok try_first_pass
auth        requisite     pam_succeed_if.so uid >= 500 quiet
auth        sufficient    pam_sss.so forward_pass
auth        required      pam_deny.so
...

Comment 2 Aneta Šteflová Petrová 2016-04-22 08:18:44 UTC
Documented in the Identity Management Guide - "9.7.1. Configuring Smart Card Authentication on an IdM Client".