On 17/03/2011 19:20, Gary Winiger wrote:
> On 03/17/11 09:51, Jan Damborsky wrote:
>> In case of Automated Installer, user is responsible for constructing
>> password hash and supply it via System Configuration profile.
>> I assume that today people just use passwd(1) and then copy paste
>> hashes from shadow(4) to System Configuration profile.
> 
>       I presume that's how jumpstart is done if passwords are
>       configured.

Would it really hurt to have a simple CLI that allowed customers to generate
password hashes like the punchin-hasher app does for punchin? This cut/paste
from shadow(4) seems a little poor for an enterprise OS.

>>> The hard part is to present the
>>> user with a conversation if this is a GUI rather than
>>> a tty based interaction.
>>
>> Yep, I agree. That's more challenging part :-)
> 
>       Not being a GUI guy, I'd really be challenged.
>       A tty based interaction is just a few line of simple
>       C.  It's well documented in the PAM developer guide
>       and the SAC Policy:
> 
> http://psarc.us.oracle.com/BestPractices/pam_tty_conv.c

A PAM conversation isn't that hard in a GUI really, it just depends on how
complex the conversation is :) But GDM and xscreensaver code can be used as
reference points to see how it can be done.

The main part really is that the application is running with the appropriate
level of auths to allow it to actually perform the conversation.

But, just to be clear, I'm assuming that we're not talking about a full-blown
login conversation here, are we?

Thanks,

Darren.

_______________________________________________
caiman-discuss mailing list
[email protected]
http://mail.opensolaris.org/mailman/listinfo/caiman-discuss

Reply via email to