<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Authentication using LDAP in Operating System - HP-UX</title>
    <link>https://community.hpe.com/t5/operating-system-hp-ux/authentication-using-ldap/m-p/4626436#M378071</link>
    <description>hi,&lt;BR /&gt;&lt;BR /&gt;check this docu :&lt;BR /&gt;&lt;BR /&gt;&lt;A href="http://www.yolinux.com/TUTORIALS/LDAP_Authentication.html" target="_blank"&gt;http://www.yolinux.com/TUTORIALS/LDAP_Authentication.html&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;mikap</description>
    <pubDate>Fri, 30 Apr 2010 07:17:15 GMT</pubDate>
    <dc:creator>Michal Kapalka (mikap)</dc:creator>
    <dc:date>2010-04-30T07:17:15Z</dc:date>
    <item>
      <title>Authentication using LDAP</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/authentication-using-ldap/m-p/4626435#M378070</link>
      <description>Hi,&lt;BR /&gt;I need to implement central authentication mechanism for Linux using LDAP. The LDAP is already setup and running. I have over 1000 Redhat Linux boxes that I want the authentication to be done centrally from the LDAP. I will also want resilence, so that when the LDAP is down, I can still logon to my linux boxes. Any detail documentation or hints will be appreciated.&lt;BR /&gt;</description>
      <pubDate>Fri, 30 Apr 2010 06:13:56 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/authentication-using-ldap/m-p/4626435#M378070</guid>
      <dc:creator>oza</dc:creator>
      <dc:date>2010-04-30T06:13:56Z</dc:date>
    </item>
    <item>
      <title>Re: Authentication using LDAP</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/authentication-using-ldap/m-p/4626436#M378071</link>
      <description>hi,&lt;BR /&gt;&lt;BR /&gt;check this docu :&lt;BR /&gt;&lt;BR /&gt;&lt;A href="http://www.yolinux.com/TUTORIALS/LDAP_Authentication.html" target="_blank"&gt;http://www.yolinux.com/TUTORIALS/LDAP_Authentication.html&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;mikap</description>
      <pubDate>Fri, 30 Apr 2010 07:17:15 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/authentication-using-ldap/m-p/4626436#M378071</guid>
      <dc:creator>Michal Kapalka (mikap)</dc:creator>
      <dc:date>2010-04-30T07:17:15Z</dc:date>
    </item>
    <item>
      <title>Re: Authentication using LDAP</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/authentication-using-ldap/m-p/4626437#M378072</link>
      <description>Haa haaa funny, you want to use ldap for 1000 servers to make your job easier, same way if ldap is down, u want the server to login via local accout as well? am i right?&lt;BR /&gt;&lt;BR /&gt;In such case, you need to have an account on LDAP and local server as well, and need to modify /etc/nsswitch.conf accordinlgy.&lt;BR /&gt;&lt;BR /&gt;ex&lt;BR /&gt;&lt;BR /&gt;passwd ldap [NOTFOUND] files&lt;BR /&gt;&lt;BR /&gt;not sure about the above systax, google for apt.</description>
      <pubDate>Fri, 30 Apr 2010 12:20:50 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/authentication-using-ldap/m-p/4626437#M378072</guid>
      <dc:creator>bullz</dc:creator>
      <dc:date>2010-04-30T12:20:50Z</dc:date>
    </item>
    <item>
      <title>Re: Authentication using LDAP</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/authentication-using-ldap/m-p/4626438#M378073</link>
      <description>The challenge that I have is that when I failed the LDAP, the password fail to logon locally.</description>
      <pubDate>Mon, 17 May 2010 13:53:20 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/authentication-using-ldap/m-p/4626438#M378073</guid>
      <dc:creator>oza</dc:creator>
      <dc:date>2010-05-17T13:53:20Z</dc:date>
    </item>
    <item>
      <title>Re: Authentication using LDAP</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/authentication-using-ldap/m-p/4626439#M378074</link>
      <description>See these options for authconfig (from man page): &lt;BR /&gt;&lt;BR /&gt;The --enablelocauthorize option allows to bypass checking network authentication services for  autho-&lt;BR /&gt;       rization  and  the  --enablesysnetauth  allows  authentication of system accounts (with uid &amp;lt; 500) by&lt;BR /&gt;       these services.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;regards,&lt;BR /&gt;ivan</description>
      <pubDate>Mon, 17 May 2010 22:58:54 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/authentication-using-ldap/m-p/4626439#M378074</guid>
      <dc:creator>Ivan Krastev</dc:creator>
      <dc:date>2010-05-17T22:58:54Z</dc:date>
    </item>
    <item>
      <title>Re: Authentication using LDAP</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/authentication-using-ldap/m-p/4626440#M378075</link>
      <description>Bullz, I have tried your suggestion but still did not work. Ivan can you explain more about the authconfig:&lt;BR /&gt;&lt;BR /&gt;My /etc/nsswitch.conf is now set as:&lt;BR /&gt;&lt;BR /&gt;passwd:     files ldap&lt;BR /&gt;shadow:     files ldap&lt;BR /&gt;group:      files ldap&lt;BR /&gt;&lt;BR /&gt;Do my LDAP need to have any special attributes on the schema?&lt;BR /&gt;&lt;BR /&gt;Any suggestion will be appreciated. When the LDAP is running the password set from the LDAP works. But when I stop/fail the LDAP, am unable to logon with the same password to the client.&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Thu, 27 May 2010 07:33:32 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/authentication-using-ldap/m-p/4626440#M378075</guid>
      <dc:creator>ozas</dc:creator>
      <dc:date>2010-05-27T07:33:32Z</dc:date>
    </item>
    <item>
      <title>Re: Authentication using LDAP</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/authentication-using-ldap/m-p/4626441#M378076</link>
      <description>Below is my /etc/pam.d/system-auth&lt;BR /&gt;# This file is auto-generated.&lt;BR /&gt;# User changes will be destroyed the next time authconfig is run.&lt;BR /&gt;auth        required      pam_env.so&lt;BR /&gt;auth        sufficient    pam_unix.so nullok try_first_pass&lt;BR /&gt;auth        requisite     pam_succeed_if.so uid &amp;gt;= 500 quiet&lt;BR /&gt;auth        sufficient    pam_ldap.so use_first_pass&lt;BR /&gt;auth        required      pam_deny.so&lt;BR /&gt;&lt;BR /&gt;account     required      pam_unix.so broken_shadow&lt;BR /&gt;account     sufficient    pam_succeed_if.so uid &amp;lt; 500 quiet&lt;BR /&gt;account     [default=bad success=ok user_unknown=ignore] pam_ldap.so&lt;BR /&gt;account     required      pam_permit.so&lt;BR /&gt;&lt;BR /&gt;password    requisite     pam_cracklib.so try_first_pass retry=3&lt;BR /&gt;password    sufficient    pam_unix.so md5 shadow nullok try_first_pass use_authtok&lt;BR /&gt;password    sufficient    pam_ldap.so use_authtok&lt;BR /&gt;password    required      pam_deny.so&lt;BR /&gt;&lt;BR /&gt;session     optional      pam_keyinit.so revoke&lt;BR /&gt;session     required      pam_limits.so&lt;BR /&gt;session     [success=1 default=ignore] pam_succeed_if.so service in crond quiet use_uid&lt;BR /&gt;session     required      pam_unix.so&lt;BR /&gt;session     optional      pam_ldap.so&lt;BR /&gt;</description>
      <pubDate>Thu, 27 May 2010 07:39:36 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/authentication-using-ldap/m-p/4626441#M378076</guid>
      <dc:creator>ozas</dc:creator>
      <dc:date>2010-05-27T07:39:36Z</dc:date>
    </item>
  </channel>
</rss>

