It allows user logins for user not known to the local host. In our case we 
want to use Kerberos as a kind of central and secure storage for user 
passwords. The user is able to authenticate via pam_krb5, but will gain 
host access for another identity / role. 

The manual page of Fedora pam_krb5 and the option no_user_check:

no_user_check
              tells  pam_krb5.so  to  not  check if a user exists on the 
local
              system, to skip authorization checks using the  user?s 
.k5login
              file,  and to create ccache files owned by the current 
process?s
              UID.  This is  useful  for  situations  where  a 
non-privileged
              server  process  needs  to  use Kerberized services on 
behalf of
              remote users who may not have local access.  Note  that such 
 a
              server  should  have  an encrypted connection with its 
client in
              order to avoid allowing the user?s password to be 
eavesdropped.

Sonja



From:
Russ Allbery <[email protected]>
To:
Sonja Benz/Germany/IBM@IBMDE
Cc:
[email protected]
Date:
07/15/2011 09:50 PM
Subject:
Re: pam_krb5 for AIX



Sonja Benz <[email protected]> writes:

> That's great. We need a pam_krb5 which supports an option like 
> "no_user_check". I guess, yours does not?

What does that option do?

-- 
Russ Allbery ([email protected])             <http://www.eyrie.org/~eagle/>


________________________________________________
Kerberos mailing list           [email protected]
https://mailman.mit.edu/mailman/listinfo/kerberos

Reply via email to