diff options
Diffstat (limited to 'pam_radius_auth.8')
-rw-r--r-- | pam_radius_auth.8 | 140 |
1 files changed, 140 insertions, 0 deletions
diff --git a/pam_radius_auth.8 b/pam_radius_auth.8 new file mode 100644 index 0000000..a713370 --- /dev/null +++ b/pam_radius_auth.8 @@ -0,0 +1,140 @@ +.TH pam_radius_auth 8 +.\" Copyright 2017 Cumulus Networks, Inc. All rights reserved. +.\" Based on USAGE file in the source package +.SH NAME +pam_radius_auth.so \- PAM RADIUS client plugin +.SH SYNOPSIS +.SH DESCRIPTION +.B pam_radius_auth +is the RADIUS client PAM plugin. +It supports IPv4 and IPv6 connections to a RADIUS server. It only supports +authentication and accounting for sessions, it does not support changing passwords, +because the RADIUS protocol does not support it. +.PP +This PAM module takes a number of standard PAM configuration options, +as well as some specific to this plugin. +.PP +options can be added by editting the files in +.I /etc/pam.d +or by editting the configuration file +.I /usr/share/pam-configs/radius +and then running +.BR pam-auth-config . +.PP +All of the following arguments are optional, and can be combined as needed. +Note that not all of these options are relevant in for all uses of the module. +.TP +.I accounting_bug +When used, the accounting response vector is NOT +validated. This option will probably only be necessary +on REALLY OLD (i.e. Livingston 1.16) servers. +.TP +.I client_id=bar +send a NAS-Identifier RADIUS attribute with string 'bar'. +If the client_id is not specified, the PAM_SERVICE +type is used instead. ('login', 'su', 'passwd', etc.) +This feature may be disabled by using 'client_id='. +i.e. A blank client ID. +.TP +.I conf=foo +set the configuration filename to 'foo'. +Default is /etc/raddb/server (/etc/pam_radius_auth.conf +on Debian systems). +.TP +.I debug +print out extensive debugging information via pam_log. +These messages generally end up being handled by +sylog(), and go to /var/log/messages. Depending on +your host operating system, the log messages may be +elsewhere. +.IP +You should generally use the debug option when first +trying configuring this module, as it will help +enormously in tracking down problems. +.TP +.I force_prompt +Request a new password and not using the previously entered +password. This usefull for multi-factor authentication +when used with a Token. +.TP +.I localifdown +This option tells pam_radius to return PAM_IGNORE instead +of PAM_AUTHINFO_UNAVAIL if RADIUS auth failed due to +network unavailability. PAM_IGNORE tells the pam stack +to continue down the stack regardless of the control flag. +.TP +.I max_challenge=# +configure maximum number of challenges that a server +may request. This is a workaround for broken servers +and disabled by default. +.TP +.I retry=# +How many times to re-send a packet if there is no +response. Once the retry count has been reached, +the module fails, and PAM continues to the next module. +.TP +.I prompt=string +Specifies the prompt, without the ': ', that PAM should +display when prompting for the password. This is useful +when using hardware tokens as part of multi-factor +authentication and presenting the same prompt twice would +confuse users. Use prompt=TokenCode (or some other +relevant string different from Password) in this +situation. +.TP +.I ruser +If PAM_USER is root, Use the value of PAM_RUSER instead +of PAM_USER to determine the username to authenticate via +RADIUS. This is to allow 'su' to act like 'sudo'. +.TP +.I skip_passwd +Do not prompt for a password, even if there was none +retrieved from the previous layer. +Send the previous one (if it exists), or else send a NULL +password. +If this fails, exit. +If an Access-Challenge is returned, display the challenge +message, and ask the user for the response. +Return success/failure as appropriate. +.IP +The password sent to the next authentication module will +NOT be the response to the challenge. If a password from +a previous authentication module exists, it is passed on. +Otherwise, no password is sent to the next module. +.TP +.I try_first_pass +Instead of prompting the user for a password, retrieve +the password from the previous authentication module. +If the password exists, try it, and return success if it +passes. +If there was no previous password, or the previous password +fails authentication, prompt the user with +"Enter RADIUS password: ", and ask for another password. +Try this password, and return success/failure as appropriate. +.IP +This is the default for authentication. +.TP +.I use_first_pass +Instead of prompting the user for a password, retrieve +the password from the previous authentication module. +If the password does not exist, return failure. +If the password exists, try it, returning success/failure +as appropriate. +.TP +.I use_authtok +force the use of a previously entered password. +This is needed for pluggable password strength checking +i.e. try cracklib to be sure it's secure, then go update +the RADIUS server. +.SH "SEE ALSO" +.BR pam_radius_auth (5), +.BR mapuser_nss (5), +.BR pam-auth-update (8) +.SH FILES +.IR /etc/pam_radius_auth.conf , +- RADIUS client configuration parameters +.I /usr/share/pam-config/radius +- configuration to generate RADIUS entries in the PAM files +.SH AUTHOR +Dave Olson <olson@cumulusnetworks.com>, based on the USAGE file written by multiple +contributors |