Hi Henry,

Alas, it doesn't work.  I think what the "binding" line does is choke 
the chain, because it doesn't accept my krb5 password.  LDAP works 
though, but still gives the "Kerberos Authentication Failed" message.

I do need the kerberos module 2nd in the chain, because some folks have 
kerberos passwords and some have LDAP passwords, but all use their LDAP 
accounts.  And if they have a kerberos password, it needs to check and 
authenticate them that way first so they can get a krb5 ticket (for 
sec=krb5 reasons with NFSv4).

Thanks for trying though.

ciao, erich

Henry B. Hotz wrote:
> 
> On Jun 30, 2006, at 8:46 AM, Erich Weiler wrote:
> 
>> # Default definitions for Authentication management
>> # Used when service name is not explicitly mentioned for authentication
>> #
>> other auth requisite pam_authtok_get.so.1
>> other auth required pam_unix_cred.so.1
>> other auth sufficient pam_unix_auth.so.1
>> other auth sufficient pam_krb5.so.1 nowarn
>> other auth sufficient pam_ldap.so.1
> 
> As a workaround, maybe:
> 
> other auth requisite pam_authtok_get.so.1
> other auth required pam_unix_cred.so.1
> other auth sufficient pam_unix_auth.so.1
> other auth optional pam_krb5.so.1 nowarn try_first_pass
> other auth binding pam_ldap.so.1 use_first_pass
> other auth required pam_krb5.so.1 nowarn use_first_pass
> 
> ??
> 
> A bit redundant with the Kerberos exchanges, but might do what you want 
> *if* the "optional" avoids the messages.  I'm assuming you have a reason 
> for putting krb5 ahead of ldap in the chain.
> ---------------------------------------------------------------------------- 
> 
> The opinions expressed in this message are mine,
> not those of Caltech, JPL, NASA, or the US Government.
> Henry.B.Hotz at jpl.nasa.gov, or hbhotz at oxy.edu
> 

-- 
===================================
Erich Weiler
UNIX Systems Administrator
School of Engineering
University of California Santa Cruz
weiler at soe.ucsc.edu
===================================

Reply via email to