diff options
| author | Dave Olson <olson@cumulusnetworks.com> | 2017-06-19 14:08:00 -0700 |
|---|---|---|
| committer | Dave Olson <olson@cumulusnetworks.com> | 2017-06-20 18:29:11 -0700 |
| commit | 61257dc81beebcf324027edb712305c376dd2052 (patch) | |
| tree | 63d44b2d756e0a5bc68138e6f253c6c6fc295a28 /USAGE | |
| parent | 3a47df99b207d85469d0a3126aacf491ba61c1d4 (diff) | |
| download | libpam-radius-auth-61257dc81beebcf324027edb712305c376dd2052.tar.gz libpam-radius-auth-61257dc81beebcf324027edb712305c376dd2052.zip | |
Add changes to allow VRF, and mapped users (no local accounts)
Add changes allow admins to set up RADIUS clients with no local
knowledge of the RADIUS accounts (no adduser required, nor LDAP, etc.)
This is done by using the nss-mapuser package. The only real change
to this package is to set up the SUDO prompt, so it's the RADIUS login
name, in the pam_sm_acct_mgmt entry point.
Bumped the version to 1.4.1
Change the PACKAGE info in configure to reflect Cumulus, and also
a few related fields. Changed maintiner to dev-support
Also incorporated changes to make debuging builds easier under debian.
Added comment and description of src_ip to the config file (author of
the src_ip changes hadn't yet done that), and removed the location of
config file from comments, since debian installs to a different
location.
Quieted config complaints; can't move to current because current is
GPLv3, and this doesn't use autoconf.
Tried to capture the 5 years of changes between 1.3.17 and 1.4.0
Added lintian overrides. Fixed up debian/copyright file to be standard
format, and match (approximately) the source files. overrides don't
quite work, because source vs binary confusion, but documents them
Added debian install files
Added man page for the plugin, and for the RADIUS client config file
Diffstat (limited to 'USAGE')
| -rw-r--r-- | USAGE | 18 |
1 files changed, 11 insertions, 7 deletions
@@ -1,4 +1,4 @@ - The module takes a number of configuration options. Password changing +This PAM module takes a number of configuration options. Password changing is not implemented, as the RADIUS protocol does not support it. The pam configuration can be: @@ -13,14 +13,17 @@ account sufficient pam_radius_auth.so the following strings. Note that not all of these options are relevant in for all uses of the module. +At a minimum, one server must be listed in the radius client configuration +file + debug - print out extensive debugging information via pam_log. These messages generally end up being handled by sylog(), and go to /var/log/messages. Depending on your host operating system, the log messages may be elsewhere. - You should generally use the debug option when first - trying to install the module, as it will help - enormously in tracking down problems. + You should generally use the debug option when first + trying to install the module, as it will help + enormously in tracking down problems. use_first_pass - Instead of prompting the user for a password, retrieve the password from the previous authentication module. @@ -54,7 +57,8 @@ skip_passwd - Do not prompt for a password, even if there was none Otherwise, no password is sent to the next module. conf=foo - set the configuration filename to 'foo'. - Default is /etc/raddb/server + Default is /etc/raddb/server (/etc/pam_radius_auth.conf + on Debian systems). client_id=bar - send a NAS-Identifier RADIUS attribute with string 'bar'. If the client_id is not specified, the PAM_SERVICE @@ -63,8 +67,8 @@ client_id=bar - send a NAS-Identifier RADIUS attribute with string i.e. A blank client ID. retry = # - How many times to re-send a packet if there is no - response. Once the retry count has been reached, - the module fails, and PAM continues to the next module. + response. Once the retry count has been reached, + the module fails, and PAM continues to the next module. use_authtok - force the use of a previously entered password. This is needed for pluggable password strength checking |
