eDirectory/PAM Authentication to Linux Services | SUSE Communities

eDirectory/PAM Authentication to Linux Services



I need to authenticate users from eDirectory via PAM to services such as VMWare Server, and perform administration using sudo.


1. Using Linux User Management (LUM) from the SLED 10 source, install and configure.

2. Add authentication sources to the appropriate pam.d files.

3. Download and install iManager plugin for Linux User Management from download.novell.com.

4. Add SLED10 DVD as an “add on product” source.

5. Search and add novell-lum , accept dependency resolution.

6. Search and add “yast2-linux-user-mgmt”.

7. Accept and install.

8. Run Yast Module under Security/Users -> Linux User management.

9. Select LDAP server, type in base DN.

Note: Since it does an LDAP search in a downward motion, you must place it at the proper height in the tree to find the users you want.

Yast gave me an error on two servers saying NAMCONFIG must be run manually because the admin users did not have rights to the tree, so I reran LUM Config and did NOT include the admin user (see the warning below).

10. Open a terminal session.

11. Run namconfig add -l 636

12. Follow the prompts. In my case, I placed the server workstations at the root of the tree.

13. Open iManager and go into the Linux User management.

14. Click enable group for LUM.

15. Find the group and make sure all users you want are a member of this group.

16. Click OK. A dialog comes up asking for the object to associate with.

17. Associate the object with the server you want.

You should be set. If not, try this:

18. Open a terminal session.

19. Run this command:

namconfig cache_refresh

Warning: Make sure you can access the LDAP server – if you don’t, gdm will fail to load and you’ll be stuck in command-line-only mode, because X cannot initialize properly. If you’re already stuck at that point, go into /etc/nssswitch.conf and find group: compat nam passwd: compat nam and remove “nam”, then save.

Authentication to VMWare

1. To get LUM users to authenticate to the VMWare Console, edit /etc/pam.d/vmware-authd to look as follows:

auth       sufficient       /lib/security/pam_unix2.so shadow nullok
auth       sufficient       /lib/security/pam_nam.so
auth       required         /lib/security/pam_unix_auth.so shadow nullok
account    sufficient       /lib/security/pam_unix2.so
account    sufficient       /lib/security/pam_nam.so
account    required         /lib/security/pam_unix_acct.so

2. To get LUM users to authenticate to sudo, edit /etc/pam.d/sudo to look as follows:

auth      sufficient  pam_nam.so
account   sufficient  pam_nam.so
password  sufficient  pam_nam.so
session   optional    pam_nam.so
auth     include        common-auth
account  include        common-account
password include        common-password
session  include        common-session

Edit /etc/sudoers to set up the sudoers file depending on what you need.

For our organization, the only group that will administer this server are users in the group “LUM-Users”, so our sudoers file looks as follows:

# In the default (unconfigured) configuration, sudo asks for the root password.
# This allows use of an ordinary user account for administration of a freshly
# installed system. When configuring sudo, delete the two
# following lines:
#Defaults targetpw    # ask for the password of the target user i.e. root
#ALL ALL=(ALL) ALL # WARNING! Only use this together with 'Defaults targetpw'!

# Runas alias specification

# User privilege specification
root    ALL=(ALL) ALL

# Uncomment to allow people in group wheel to run all commands
# %wheel        ALL=(ALL)       ALL
  %LUM-Users    ALL=(ALL)       ALL
# Same thing without a password
# %wheel        ALL=(ALL)       NOPASSWD: ALL

# Samples
# %users  ALL=/sbin/mount /cdrom,/sbin/umount /cdrom
# %users  localhost=/sbin/shutdown -h now
%hpsmh ALL=NOPASSWD:/etc/init.d/snmpd
%hpsmh ALL=NOPASSWD:/usr/bin/snmptrap


SLES 10, SLED 10, VMWare Server 1.0.1, sudo

(Visited 1 times, 1 visits today)

Leave a Reply

Your email address will not be published.

No comments yet