blob: 1ab27e86163194ffd8e36b8e5088f2997a17f656 (
plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
|
This is a simple and safe example on how to enable radius
authentication to the console login on a Debian system and
you are too lazy to read the USAGE documentation.
Edit /etc/pam.d/login
The default looks like:
[SNIP]
# Disallows other than root logins when /etc/nologin exists
# (Replaces the `NOLOGINS_FILE' option from login.defs)
auth requisite pam_nologin.so
# This module parses /etc/environment (the standard for setting
# environ vars) and also allows you to use an extended config
# file /etc/security/pam_env.conf.
# (Replaces the `ENVIRON_FILE' setting from login.defs)
auth required pam_env.so
# Standard Un*x authentication. The "nullok" line allows passwordless
# accounts.
@include common-auth
[SNIP]
Insert the following line:
auth sufficient pam_radius_auth.so
AFTER
auth required pam_env.so
and BEFORE
# Standard Un*x authentication. The "nullok" line allows passwordless
# accounts.
@include common-auth
so that it will looks like:
[SNIP]
# This module parses /etc/environment (the standard for setting
# environ vars) and also allows you to use an extended config
# file /etc/security/pam_env.conf.
# (Replaces the `ENVIRON_FILE' setting from login.defs)
auth required pam_env.so
##### RADIUS #####
auth sufficient pam_radius_auth.so
# Standard Un*x authentication. The "nullok" line allows passwordless
# accounts.
@include common-auth
[SNIP]
Try now to login in one of the consoles using the radius password.
If it fails the system will prompt again for a password. This time
provide the local one.
|