Thank you for pointing that out.
I should of course have been more specific: native aix sudo does not support 
ldap and therefore sudorules from ldap, but it is possible
to install a different sudo version with ldap enabled.
Unfortunately, in our case, using external rpm's is not an option.

Bjarne Blichfeldt.

From: Luiz Fernando Vianna da Silva []
Sent: 16. maj 2017 16:43
To: Bjarne Blichfeldt <>;
Subject: Re: [Freeipa-users] IPA Compat + ID Views + AIX 7.1

As far as I found out, it is not possible to integrate sudo rules from IPA into 
AIX. sudo on aix does not support that.
You will have to maintain /etc/sudoers by som other means.
Thats where you are mistaken. It is possible to integrate sudo rules into AIX, 
I've done it and have documented it here:

Give it a try, its a fairly simple procedure.


IBM has recently pimped the AIX toolbox RPMs and even implemented it as a YUM 
server. I haven't tried using these new RPMs yet to see if they work with sudo 

If you want to keep it safe, user perzl RPMs as I describe on the 
documentation. If you want, and I would appreciate it if you would, give the 
new RPMs from toolbox a go and if it works please update the documentaion, or 
send me your notes and I'll update it.
Atenciosamente/Best Regards
Luiz Fernando Vianna da Silva
Em 15-05-2017 02:53, Bjarne Blichfeldt escreveu:
We have a working setup on three aix servers and by comparing our config with 
yours, I see the following differences:

/etc/security/ldap/ldap.cfg :

/etc/security/ldap/ file


keyobjectclass  SEC_CHAR        posixaccount    s

# The following attributes are required by AIX to be functional

username        SEC_CHAR        uid             s

id              SEC_INT         uidnumber       s

pgrp            SEC_CHAR        gidnumber       s

home            SEC_CHAR        homedirectory   s

shell           SEC_CHAR        loginshell      s

gecos           SEC_CHAR        gecos           s

spassword       SEC_CHAR        userpassword    s

lastupdate      SEC_INT         shadowlastchange        s

/etc/security/ldap/ file

groupname       SEC_CHAR        cn              s
id              SEC_INT         gidNumber       s
users           SEC_LIST        member          m

To test if the ldap is working:
lsldap -a passwd
lsuser -R LDAP ALL


        program = /usr/lib/security/KRB5
        program_64 = /usr/lib/security/KRB5_64
        options = 

Add Kerberos to authorized authentication entities and verify:
chauthent -k5 -std
Kerberos 5
Standard Aix

To test:
lsuser -R KRB5LDAP <someuser>

Configure aix to create homedir during login:
mkhomeatlogin = true

        shells = 
        maxlogins = 32767
        logintimeout = 30
        maxroles = 8
        auth_type = STD_AUTH
        mkhomeatlogin = true

Also remember: user can be locked in AIX so use smitty to unlock user and reset 
login attempts.

As far as I found out, it is not possible to integrate sudo rules from IPA into 
AIX. sudo on aix does not support that.
You will have to maintain /etc/sudoers by som other means.

Hope that helps, good luck.

Bjarne Blichfeldt.

Sent: 12. maj 2017 16:03
Subject: Re: [Freeipa-users] IPA Compat + ID Views + AIX 7.1

Yes, kinit works with IPA users. GSSAPI authentication is not keeping it 
simple, since we want passwords to work before trying TGS based logins over 
The keytab works sinds lsuser is still able to get user data. (Documentation 
specifies that enabling krb5 in ldap.cfg makes the bind user and password moot, 
secldapclntd uses krb5 to identify itself to IPA)

Also we are able to kinit 
 -kt /etc/krb5/krb5.keytab

We van try using su from an unprivileged user, but su has some different issues 
altogether, it doesn't like @ in usernames which we need at the next stage 
(integrating AD Trust)

From: Iulian Roman []
Sent: vrijdag 12 mei 2017 15:56
To: Hummelink, Wouter
Subject: Re: [Freeipa-users] IPA Compat + ID Views + AIX 7.1

On Fri, May 12, 2017 at 3:31 PM, 
<<>> wrote:
The shell is shown correctly as ksh in lsuser, so that doesnt appear to be an 
issue for the ID view.

My advice would be to start simple ,prove that your authentication works and 
you can develop a more elaborated setup afterwards. If you combine them all 
together it will be a trial and error which eventually will work at some point.
Do you have the correct keytabs in /etc/krb5/krb5.keytab ? can you run kinit 
(with password and with the keytab) from aix and get a ticket from Kerberos ? 
can you su to an IPA account ? do you have GSSAPIAuthentication enabled in 
sshd_config  ?
>From what you've described i would suspect that your keytab is not correct , 
>but that should be confirmed only by answering the questions above.

Verzonden vanaf mijn Samsung-apparaat

-------- Oorspronkelijk bericht --------
Van: Luiz Fernando Vianna da Silva 
Datum: 12-05-17 15:03 (GMT+01:00)
Aan: "Hummelink, Wouter" 
Onderwerp: Re: [Freeipa-users] IPA Compat + ID Views + AIX 7.1

Hello Wouter.

It may seem silly, but try installing bash on one AIX server and test 
authenticating against that one.

Its a single rpm with no dependencies. For me it did the trick and I ended up 
doing that on all my AIX servers.

Let me know how it goes or if you have any issues.
Best Regards
Luiz Fernando Vianna da Silva

Em 12-05-2017 09:47,<> 
Hi All,

We're running a POC to integrate IPA and AIX using AIX KRB5LDAP compound module.
All the moving parts seem to be working on their own, however logging in 
doesn't work with SSH on AIX reporting Failed password for user <xxx>

We're using ID views to overwrite the user shell and home dirs. (Since AIX will 
refuse a login with a nonexisting shell (like bash))
AIXs lsuser command is able to find all of the users it's supposed to and su to 
IPA users works.
Also when a user tries to log in I can see a successful Kerberos conversation 
to our IPA server.

Tips for troubleshooting would be much appreciated, increasing SSH log level 
did not produce any meaningful logging.

=============== Configuration Excerpt 
ldapsslkeypwd:{DESv2}4688216124E33174C03FBBB420 88FA8 

/etc/security/user default:
SYSTEM = KRB5LDAP or compat


       program = /usr/lib/security/LDAP

       program_64 =/usr/lib/security/LDAP64


       program = /usr/lib/security/NIS

       program_64 = /usr/lib/security/NIS_64


       program = /usr/lib/security/DCE


       program = /usr/lib/security/KRB5

       program_64 = /usr/lib/security/KRB5_64

       options = 


       options = auth=KRB5,db=LDAP

Met vriendelijke groet,
Wouter Hummelink
Technical Consultant - Enterprise Webhosting / Tooling & Automation
T: +31-6-12882447<tel:+31%206%2012882447>

Manage your subscription for the Freeipa-users mailing list:
Go to for more info on the project

Manage your subscription for the Freeipa-users mailing list:
Go to for more info on the project

Reply via email to