On 19.5. 13:25, Simon Josefsson wrote:
Patrick Proniewski <[email protected]> writes:
Is it possible to authenticate on a server through pam_ldap (non-local
users) with the added security of pam_oath?

It depends.

You could do it the same way as with pam_unix:
 /etc/pam.d/common-auth:
 auth    required        pam_unix.so nullok_secure
auth required pam_oath.so debug usersfile=/etc/users.oath window=3

plink:~$ ssh cartman@localhost " echo OK! "
Password:
One-time password (OATH) for `cartman':
OK!

(and set ChallengeResponseAuthentication yes and UsePAM yes in sshd_config)

That should work with pam_ldap too, but the major downside is that you need to have the usersfile locally and the keys cannot be shared between machines. Another feature of that configuration is that since the authentication steps are totally separate, the OTP counter will advance whenever the OTP is correct, even if the static password is invalid.

If you want to have the OTP keys centralized in LDAP, then I don't know if there is anything ready-made for that.

No, not to my knowledge.  A lot of PAM
modules include LDAP support natively to adress this use-case.

Hmm, what modules are there that do it?

--
Ilkka Virta <[email protected]>

Reply via email to