Description of problem: My system-auth has these auth lines (created by authconfig): auth required pam_env.so auth sufficient pam_unix.so nullok try_first_pass auth requisite pam_succeed_if.so uid >= 500 quiet auth sufficient pam_krb5.so use_first_pass auth required pam_deny.so With this PAM configuration there is a behavioral oddity. * If I have a regular user account with UID less than 500 whose password comes from /etc/{passwd,shadow}, or NIS, the user can login no problem. * If I have a LDAP,Kerberos,SMB/Windbnd regular user account with a UID less than 500 then the user cannot login. This is inconsistent, they should either both work or both fail. In other words; FAILS: useradd -p "*K*" -u 303 userc # using kerberos auth WORKS: useradd -u 303 userc echo "passa" | passwd --stdin userc
The accounts with uid < 500 are considered to be system accounts which should not be authenticated by the remote servers. But don't worry authconfig already supports your request - simple 'authconfig --enablesysnetauth --update' will remove the pam_succeed_if line from the system-auth-ac.