While this is true, people who get paid a lot more than I do decided we shouldn't be pointing authentication to individual machines and instead use domain lookups, which winbind does nicely. I was able to replicate the old functionality by pointing the pam stack directly to dc01.domain.com, but that defeats the purpose of having a decentralized authentication system. OpenLDAP was decentralized, but we were using a load balancer that allowed one address to point to multiple machines (ldap.domain and kerberos.domain); apparently this isn't possible with ActiveDirectory, we can't have just one IP and host name for all of our domain controllers.

kinit and aklog still work as they're supposed to, as does pagsh, after the user is logged in. I'm also able to make GSSAPI play nice, in that any user who already has kerberos tickets will transfer those tickets AND get an AFS token on whatever server they log into.

- Ben

On 8/30/12 6:41 PM, Russ Allbery wrote:
Ben Howell <[email protected]> writes:

Is it possible to reproduce the combination of pam_krb5 and
pam_afs_session to create a PAG and generate a ticket and AFS token on
login using winbind's KRB5 mechanism? I think at this point the only
thing I haven't done is write my own module from scratch; I've tried
every pam stack combination I can think of, and the ones that work don't
generate a ticket or token. Is this just a pipe dream, or is it actually
possible, and I'm looking in the wrong place?
I don't know a lot about Winbind, so this may be a naive question, but why
are you using it for authentication instead of just continuing to use
pam_krb5?  Active Directory is a perfectly capable Kerberos KDC that
responds to the same protocol as any other Kerberos KDC.


_______________________________________________
OpenAFS-info mailing list
[email protected]
https://lists.openafs.org/mailman/listinfo/openafs-info

Reply via email to