That is entirely correct.  I though the access checks were done in auth,
not in account.  My mistake!

Sincerely,
Zach

On Mon, Apr 17, 2017 at 4:46 AM, Jakub Hrozek <jhro...@redhat.com> wrote:

> On Fri, Apr 14, 2017 at 08:10:35PM -0000, zac...@temple.edu wrote:
> > Hi list,
> >
> > This is more of a feature request, and I don't know if this is the right
> venue to ask.  If not, kindly direct me to the proper place.
> >
> > The sssd configuration separates identity, authentication, and access
> providers.   It would be nice to specify that only the access provider be
> enforced in a particular PAM stack.  Generically, this is the authn vs
> authz issue.  I would like to be able to use sssd for authz exclusively in
> some instances where other authentication is deemed satisfactory.
> >
> > Use cases:
> > ssh with public key + 2nd factor token authentication + sssd access
> filtering
> > su without password + sssd access filtering
> > custom service with external authentication + sssd access filtering
> >
> > I haven't delved too deeply into the sssd source to see how hard it
> would be to implement something like a pam argument authz_only that skips
> the auth provider, but it seems like it should be reasonable.
> >
> > Thoughts?
>
> Since this option would be set in the PAM service file anyway, does it
> make sense to even include pam_sss.so in the PAM stack's auth session?
> _______________________________________________
> sssd-devel mailing list -- sssd-devel@lists.fedorahosted.org
> To unsubscribe send an email to sssd-devel-le...@lists.fedorahosted.org
>
_______________________________________________
sssd-devel mailing list -- sssd-devel@lists.fedorahosted.org
To unsubscribe send an email to sssd-devel-le...@lists.fedorahosted.org

Reply via email to