*** Reply to note of Thu, 18 Dec 2003 10:18:41 -0500 (EST/CDT)
*** by [EMAIL PROTECTED]

I did a couple of tests and it seems to work for me (by default we use
SecurID for the authentication part). You may need a newer pam_ldap version
(I am using pam_ldap-164).

The ACL depends on if you are using anonymous bind or a proxy user
(rootbinddn). You can start with:

    access to dn="..dc=com" attr=userPassword
            by self write
            by anonymous auth
            by * none
    access to *
            by * read
and change as needed.

SLES8 includes the CPU tool to add/change/delete users and groups


Sal

Eric Sammons <[EMAIL PROTECTED]> writes:
>I have done that and it sort of worked.  It seemed to take on the
>characteristics there after of a ACL problem.  By changing the acls I get
>different behavior; however, I can't seem to find the right acls that
>cause the implementation to work.
>
>Do you have this working?  Can I ask what your LDAP ACLs look like?
>
>Thanks!
>Eric Sammons
>(804)697-3925
>FRIT - Unix Systems
>
>
>
>
>
>"Sal Torres/SBC Inc." <[EMAIL PROTECTED]>
>Sent by: Linux on 390 Port <[EMAIL PROTECTED]>
>12/18/2003 10:03 AM
>Please respond to Linux on 390 Port
>
>        To:     [EMAIL PROTECTED]
>        cc:
>        Subject:        Anyone using OpenLDAP with SLES8? Question with
>Passwords
>
>Try to set the shadow last change to zero. pam_ldap is supposed to
>expire the account:
>...
>  if (session->info->shadow.lstchg == 0)
>     {
>       /*
>        * Adhere to convention of a shadow last change
>        * value of 0 implying that the password has
>        * expired. Apparently this is documented in the
>        * shadow suite (libmisc/isexpired.c).
>        */
>       session->info->password_expired = 1;
>...
>
>sal

Reply via email to