<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: LDAP Problems in Operating System - HP-UX</title>
    <link>https://community.hpe.com/t5/operating-system-hp-ux/ldap-problems/m-p/4319192#M651932</link>
    <description>&lt;BR /&gt;&lt;BR /&gt;hpux /etc # cat krb5.conf&lt;BR /&gt;# Kerberos configuration&lt;BR /&gt;#&lt;BR /&gt;# see krb5.conf(4) for more details&lt;BR /&gt;#&lt;BR /&gt;[libdefaults]&lt;BR /&gt;         default_realm = LDAP.TESTE&lt;BR /&gt;         default_tkt_enctypes = DES-CBC-CRC DES-CBC-MD5&lt;BR /&gt;         default_tgs_enctypes = DES-CBC-CRC DES-CBC-MD5&lt;BR /&gt;         ccache_type = 2&lt;BR /&gt;[realms]&lt;BR /&gt;         LDAP.TESTE = {&lt;BR /&gt;            kdc = ad2003.ldap.teste:88&lt;BR /&gt;            admin_server = ad2003.ldap.teste&lt;BR /&gt;         }&lt;BR /&gt;[domain_realm]&lt;BR /&gt;         .ldap.teste = LDAP.TESTE&lt;BR /&gt;#&lt;BR /&gt;# End of krb5.conf&lt;BR /&gt;hpux /etc #&lt;BR /&gt;&lt;BR /&gt;===============================================================&lt;BR /&gt;&lt;BR /&gt;hpux /etc # cat /etc/nsswitch.conf&lt;BR /&gt;#&lt;BR /&gt;# /etc/nsswitch.ldap:&lt;BR /&gt;#&lt;BR /&gt;# An example file that could be copied over to /etc/nsswitch.conf.  It&lt;BR /&gt;# uses LDAP (Lightweight Directory Access Protocol) in conjunction with&lt;BR /&gt;# dns &amp;amp; files.&lt;BR /&gt;#&lt;BR /&gt;&lt;BR /&gt;passwd:       files&lt;BR /&gt;group:        files&lt;BR /&gt;hosts:        dns files&lt;BR /&gt;networks:     files&lt;BR /&gt;protocols:    files&lt;BR /&gt;rpc:          files&lt;BR /&gt;publickey:    files&lt;BR /&gt;netgroup:     files&lt;BR /&gt;automount:    files&lt;BR /&gt;aliases:      files&lt;BR /&gt;services:     files&lt;BR /&gt;hpux /etc #&lt;BR /&gt;&lt;BR /&gt;===============================================================&lt;BR /&gt;&lt;BR /&gt;hpux /etc # cat pam.conf&lt;BR /&gt;#&lt;BR /&gt;# PAM configuration&lt;BR /&gt;#&lt;BR /&gt;# This pam.conf file is intended as an example only.&lt;BR /&gt;# see pam.conf(4) for more details&lt;BR /&gt;#&lt;BR /&gt;#&lt;BR /&gt;################################################################&lt;BR /&gt;# This sample file will authenticate the user who belongs to   #&lt;BR /&gt;# either Kerberos or Unix system. Using this configuration file#&lt;BR /&gt;# if the user is authenticated through Kerberos then the Unix  #&lt;BR /&gt;# authentication will not be invoked. However,if the Kerberos  #&lt;BR /&gt;# authentication fails for the user, then the fallback         #&lt;BR /&gt;# authentication mechanism PAM-Unix will be invoked to         #&lt;BR /&gt;# authenticate the user.The assumption is the user is either   #&lt;BR /&gt;# present in Kerberos or in Unix system.                       #&lt;BR /&gt;#                                                              #&lt;BR /&gt;# In case, the administrator wants the password for all the    #&lt;BR /&gt;# users to be synchronous between Kerberos and Unix systems,   #&lt;BR /&gt;# then the control flag should to be set to "required" for all #&lt;BR /&gt;# the entries with use_first_pass option set for pam_unix.     #&lt;BR /&gt;# If password synchronization is optional then try_first_pass  #&lt;BR /&gt;# option need to be set for pam_unix, so that the user can     #&lt;BR /&gt;# login using the appropriate passwords.                       #&lt;BR /&gt;#                                                              #&lt;BR /&gt;# The module pam_hpsec(5) is stacked as mandatory module above #&lt;BR /&gt;# all the modules for making security checks before            #&lt;BR /&gt;# authentication.                                              #&lt;BR /&gt;################################################################&lt;BR /&gt;#&lt;BR /&gt;#&lt;BR /&gt;# Authentication management&lt;BR /&gt;#&lt;BR /&gt;login      auth required     libpam_hpsec.so.1&lt;BR /&gt;login      auth sufficient   libpam_krb5.so.1 debug&lt;BR /&gt;login      auth required     libpam_unix.so.1 try_first_pass&lt;BR /&gt;su         auth required     libpam_hpsec.so.1&lt;BR /&gt;su         auth sufficient   libpam_krb5.so.1&lt;BR /&gt;su         auth required     libpam_unix.so.1 try_first_pass&lt;BR /&gt;dtlogin    auth required     libpam_hpsec.so.1&lt;BR /&gt;dtlogin    auth sufficient   libpam_krb5.so.1&lt;BR /&gt;dtlogin    auth required     libpam_unix.so.1 try_first_pass&lt;BR /&gt;dtaction   auth required     libpam_hpsec.so.1&lt;BR /&gt;dtaction   auth sufficient   libpam_krb5.so.1&lt;BR /&gt;dtaction   auth required     libpam_unix.so.1 try_first_pass&lt;BR /&gt;ftp        auth required     libpam_hpsec.so.1&lt;BR /&gt;ftp        auth sufficient   libpam_krb5.so.1&lt;BR /&gt;ftp        auth required     libpam_unix.so.1 try_first_pass&lt;BR /&gt;OTHER      auth required     libpam_unix.so.1&lt;BR /&gt;#&lt;BR /&gt;# Account management&lt;BR /&gt;#&lt;BR /&gt;login      account required    libpam_hpsec.so.1&lt;BR /&gt;login      account sufficient  libpam_krb5.so.1&lt;BR /&gt;login      account required    libpam_unix.so.1&lt;BR /&gt;su         account required    libpam_hpsec.so.1&lt;BR /&gt;su         account sufficient  libpam_krb5.so.1&lt;BR /&gt;su         account required    libpam_unix.so.1&lt;BR /&gt;dtlogin    account required    libpam_hpsec.so.1&lt;BR /&gt;dtlogin    account sufficient  libpam_krb5.so.1&lt;BR /&gt;dtlogin    account required    libpam_unix.so.1&lt;BR /&gt;dtaction   account required    libpam_hpsec.so.1&lt;BR /&gt;dtaction   account sufficient  libpam_krb5.so.1&lt;BR /&gt;dtaction   account required    libpam_unix.so.1&lt;BR /&gt;ftp        account required     libpam_hpsec.so.1&lt;BR /&gt;ftp        account sufficient  libpam_krb5.so.1&lt;BR /&gt;ftp        account required    libpam_unix.so.1&lt;BR /&gt;OTHER      account required    libpam_unix.so.1&lt;BR /&gt;#&lt;BR /&gt;# Session management&lt;BR /&gt;#&lt;BR /&gt;login      session required    libpam_hpsec.so.1&lt;BR /&gt;login      session sufficient  libpam_krb5.so.1&lt;BR /&gt;login      session required    libpam_unix.so.1&lt;BR /&gt;dtlogin    session required    libpam_hpsec.so.1&lt;BR /&gt;dtlogin    session sufficient  libpam_krb5.so.1&lt;BR /&gt;dtlogin    session required    libpam_unix.so.1&lt;BR /&gt;dtaction   session required    libpam_hpsec.so.1&lt;BR /&gt;dtaction   session sufficient  libpam_krb5.so.1&lt;BR /&gt;dtaction   session required    libpam_unix.so.1&lt;BR /&gt;OTHER      session required    libpam_unix.so.1&lt;BR /&gt;#&lt;BR /&gt;# Password management&lt;BR /&gt;#&lt;BR /&gt;login      password required    libpam_updbe.so.1&lt;BR /&gt;login      password required    libpam_hpsec.so.1&lt;BR /&gt;login      password required    libpam_krb5.so.1 debug&lt;BR /&gt;login      password required    libpam_unix.so.1&lt;BR /&gt;#&lt;BR /&gt;##login      password required    libpam_hpsec.so.1&lt;BR /&gt;##login      password sufficient  libpam_krb5.so.1&lt;BR /&gt;##login      password required    libpam_unix.so.1&lt;BR /&gt;passwd     password required    libpam_hpsec.so.1&lt;BR /&gt;passwd     password sufficient  libpam_krb5.so.1&lt;BR /&gt;passwd     password required    libpam_unix.so.1&lt;BR /&gt;dtlogin    password required    libpam_hpsec.so.1&lt;BR /&gt;dtlogin    password sufficient  libpam_krb5.so.1&lt;BR /&gt;dtlogin    password required    libpam_unix.so.1&lt;BR /&gt;dtaction   password required    libpam_hpsec.so.1&lt;BR /&gt;dtaction   password sufficient  libpam_krb5.so.1&lt;BR /&gt;dtaction   password required    libpam_unix.so.1&lt;BR /&gt;OTHER      password required    libpam_unix.so.1&lt;BR /&gt;hpux /etc #&lt;BR /&gt;&lt;BR /&gt;================================================================&lt;BR /&gt;&lt;BR /&gt;hpux /etc # cat pam_user.conf&lt;BR /&gt;#&lt;BR /&gt;# This file defines PAM configuration for a user. The configuration&lt;BR /&gt;# here overrides pam.conf.&lt;BR /&gt;#&lt;BR /&gt;# The format for each entry is:&lt;BR /&gt;# user_name  module_type  module_path options&lt;BR /&gt;#&lt;BR /&gt;# For example:&lt;BR /&gt;#&lt;BR /&gt;# user_a        auth      /usr/lib/security/$ISA/libpam_unix.so.1     debug&lt;BR /&gt;# user_a        auth      /usr/lib/security/$ISA/libpam_dce.so.1      try_first_pass&lt;BR /&gt;# user_a        password  /usr/lib/security/$ISA/libpam_unix.so.1     debug&lt;BR /&gt;#&lt;BR /&gt;# user_b        auth      /usr/lib/security/$ISA/libpam_unix.so.1     debug use_psd&lt;BR /&gt;# user_b        password  /usr/lib/security/$ISA/libpam_unix.so.1     debug use_psd&lt;BR /&gt;#&lt;BR /&gt;#&lt;BR /&gt;# Note: For PA applications /usr/lib/security/&lt;MODULE_NAME&gt;.so.1&lt;BR /&gt;# should be a symbolic link to an appropriate PA PAM module.&lt;BR /&gt;#&lt;BR /&gt;# See the pam_user.conf(4) manual page for more information&lt;BR /&gt;#&lt;BR /&gt;root    auth            /usr/lib/security/libpam_krb5.so.1 ignore&lt;BR /&gt;root    password        /usr/lib/security/libpam_krb5.so.1 ignore&lt;BR /&gt;hpux /etc #&lt;BR /&gt;&lt;BR /&gt;=================================================================&lt;BR /&gt;&lt;BR /&gt;hpux /etc # kinit teste1&lt;BR /&gt;Password for teste1@LDAP.TESTE:&lt;BR /&gt;&lt;BR /&gt;hpux /etc # klist&lt;BR /&gt;Ticket cache: FILE:/tmp/krb5cc_0&lt;BR /&gt;Default principal: teste1@LDAP.TESTE&lt;BR /&gt;&lt;BR /&gt;Valid starting     Expires            Service principal&lt;BR /&gt;12/07/08 10:33:58  12/07/08 20:33:58  krbtgt/LDAP.TESTE@LDAP.TESTE&lt;BR /&gt;hpux /etc #&lt;BR /&gt;&lt;BR /&gt;==================================================================&lt;BR /&gt;&lt;BR /&gt;hpux /etc # swlist -l bundle | grep -i krb&lt;BR /&gt;  KRB5CLIENT            D.1.6.2        Kerberos V5 Client Version 1.6.2&lt;BR /&gt;hpux /etc #&lt;BR /&gt;&lt;BR /&gt;==================================================================&lt;BR /&gt;&lt;BR /&gt;hpux /etc # ll /etc/krb5.keytab&lt;BR /&gt;-rw-------   1 root       sys             72 Dec  4 18:32 /etc/krb5.keytab&lt;BR /&gt;&lt;BR /&gt;hpux /etc # strings /etc/krb5.keytab&lt;BR /&gt;LDAP.TESTE&lt;BR /&gt;host&lt;BR /&gt;hpux.ldap.teste&lt;BR /&gt;6GEJP&lt;BR /&gt;hpux /etc #&lt;BR /&gt;&lt;BR /&gt;==================================================================&lt;BR /&gt;&lt;BR /&gt;syslog.log&lt;BR /&gt;&lt;BR /&gt;Dec  5 16:37:47 hpux sshd[7555]: Invalid user teste1 from 100.100.100.161&lt;BR /&gt;Dec  5 16:37:47 hpux sshd[7555]: Failed none for invalid user teste1 from 100.100.100.161 port 55197 ssh2&lt;BR /&gt;Dec  5 16:37:52 hpux sshd[7555]: error: PAM: No account present for user for illegal user teste1 from 100.100.100.161&lt;BR /&gt;Dec  5 16:37:52 hpux sshd[7555]: Failed keyboard-interactive/pam for invalid user teste1 from 100.100.100.161 port 55197 ssh2&lt;BR /&gt;Dec  5 16:38:08 hpux sshd[7555]: error: PAM: No account present for user for illegal user teste1 from 100.100.100.161&lt;BR /&gt;Dec  5 16:38:08 hpux sshd[7555]: Failed keyboard-interactive/pam for invalid user teste1 from 100.100.100.161 port 55197 ssh2&lt;BR /&gt;Dec  5 15:58:22 hpux login: [No account present for user] Password not valid&lt;BR /&gt;Dec  5 17:16:58 hpux sshd[13657]: Did not receive identification string from UNKNOWN&lt;BR /&gt;Dec  5 17:20:48 hpux sshd[14158]: Invalid user teste1 from 100.100.100.161&lt;BR /&gt;Dec  5 17:20:48 hpux sshd[14158]: Failed none for invalid user teste1 from 100.100.100.161 port 39946 ssh2&lt;BR /&gt;Dec  5 17:20:53 hpux sshd[14158]: error: PAM: No account present for user for illegal user teste1 from 100.100.100.161&lt;BR /&gt;Dec  5 17:20:53 hpux sshd[14158]: Failed keyboard-interactive/pam for invalid user teste1 from 100.100.100.161 port 39946 ssh2&lt;BR /&gt;&lt;BR /&gt;===================================================================&lt;BR /&gt;&lt;BR /&gt;hpux / # swlist -l product| grep -i kerb&lt;BR /&gt;  KRB5-Client           B.11.23        Kerberos V5 Client Version 1.0&lt;BR /&gt;  PAM-Kerberos          C.01.24        PAM-Kerberos Version 1.24&lt;BR /&gt;  krb5client            D.1.6.2        Kerberos V5 Client Version 1.6.2&lt;BR /&gt;hpux / #&lt;BR /&gt;&lt;BR /&gt;===================================================================&lt;BR /&gt;&lt;BR /&gt;&lt;/MODULE_NAME&gt;</description>
    <pubDate>Tue, 09 Dec 2008 12:08:42 GMT</pubDate>
    <dc:creator>Fernando Jose P de Souz</dc:creator>
    <dc:date>2008-12-09T12:08:42Z</dc:date>
    <item>
      <title>LDAP Problems</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/ldap-problems/m-p/4319191#M651931</link>
      <description>Hi, &lt;BR /&gt;&lt;BR /&gt;I would like to authenticate in my HP-UX 11.23 windows users. &lt;BR /&gt;AD Server: Windows 2003 Server&lt;BR /&gt;Domain: ldap.teste&lt;BR /&gt;user: teste1&lt;BR /&gt;&lt;BR /&gt;Output of commands and files in attach.&lt;BR /&gt;&lt;BR /&gt;Wait&lt;BR /&gt;&lt;BR /&gt;Fernando.&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Sun, 07 Dec 2008 23:45:45 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/ldap-problems/m-p/4319191#M651931</guid>
      <dc:creator>Fernando Jose P de Souz</dc:creator>
      <dc:date>2008-12-07T23:45:45Z</dc:date>
    </item>
    <item>
      <title>Re: LDAP Problems</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/ldap-problems/m-p/4319192#M651932</link>
      <description>&lt;BR /&gt;&lt;BR /&gt;hpux /etc # cat krb5.conf&lt;BR /&gt;# Kerberos configuration&lt;BR /&gt;#&lt;BR /&gt;# see krb5.conf(4) for more details&lt;BR /&gt;#&lt;BR /&gt;[libdefaults]&lt;BR /&gt;         default_realm = LDAP.TESTE&lt;BR /&gt;         default_tkt_enctypes = DES-CBC-CRC DES-CBC-MD5&lt;BR /&gt;         default_tgs_enctypes = DES-CBC-CRC DES-CBC-MD5&lt;BR /&gt;         ccache_type = 2&lt;BR /&gt;[realms]&lt;BR /&gt;         LDAP.TESTE = {&lt;BR /&gt;            kdc = ad2003.ldap.teste:88&lt;BR /&gt;            admin_server = ad2003.ldap.teste&lt;BR /&gt;         }&lt;BR /&gt;[domain_realm]&lt;BR /&gt;         .ldap.teste = LDAP.TESTE&lt;BR /&gt;#&lt;BR /&gt;# End of krb5.conf&lt;BR /&gt;hpux /etc #&lt;BR /&gt;&lt;BR /&gt;===============================================================&lt;BR /&gt;&lt;BR /&gt;hpux /etc # cat /etc/nsswitch.conf&lt;BR /&gt;#&lt;BR /&gt;# /etc/nsswitch.ldap:&lt;BR /&gt;#&lt;BR /&gt;# An example file that could be copied over to /etc/nsswitch.conf.  It&lt;BR /&gt;# uses LDAP (Lightweight Directory Access Protocol) in conjunction with&lt;BR /&gt;# dns &amp;amp; files.&lt;BR /&gt;#&lt;BR /&gt;&lt;BR /&gt;passwd:       files&lt;BR /&gt;group:        files&lt;BR /&gt;hosts:        dns files&lt;BR /&gt;networks:     files&lt;BR /&gt;protocols:    files&lt;BR /&gt;rpc:          files&lt;BR /&gt;publickey:    files&lt;BR /&gt;netgroup:     files&lt;BR /&gt;automount:    files&lt;BR /&gt;aliases:      files&lt;BR /&gt;services:     files&lt;BR /&gt;hpux /etc #&lt;BR /&gt;&lt;BR /&gt;===============================================================&lt;BR /&gt;&lt;BR /&gt;hpux /etc # cat pam.conf&lt;BR /&gt;#&lt;BR /&gt;# PAM configuration&lt;BR /&gt;#&lt;BR /&gt;# This pam.conf file is intended as an example only.&lt;BR /&gt;# see pam.conf(4) for more details&lt;BR /&gt;#&lt;BR /&gt;#&lt;BR /&gt;################################################################&lt;BR /&gt;# This sample file will authenticate the user who belongs to   #&lt;BR /&gt;# either Kerberos or Unix system. Using this configuration file#&lt;BR /&gt;# if the user is authenticated through Kerberos then the Unix  #&lt;BR /&gt;# authentication will not be invoked. However,if the Kerberos  #&lt;BR /&gt;# authentication fails for the user, then the fallback         #&lt;BR /&gt;# authentication mechanism PAM-Unix will be invoked to         #&lt;BR /&gt;# authenticate the user.The assumption is the user is either   #&lt;BR /&gt;# present in Kerberos or in Unix system.                       #&lt;BR /&gt;#                                                              #&lt;BR /&gt;# In case, the administrator wants the password for all the    #&lt;BR /&gt;# users to be synchronous between Kerberos and Unix systems,   #&lt;BR /&gt;# then the control flag should to be set to "required" for all #&lt;BR /&gt;# the entries with use_first_pass option set for pam_unix.     #&lt;BR /&gt;# If password synchronization is optional then try_first_pass  #&lt;BR /&gt;# option need to be set for pam_unix, so that the user can     #&lt;BR /&gt;# login using the appropriate passwords.                       #&lt;BR /&gt;#                                                              #&lt;BR /&gt;# The module pam_hpsec(5) is stacked as mandatory module above #&lt;BR /&gt;# all the modules for making security checks before            #&lt;BR /&gt;# authentication.                                              #&lt;BR /&gt;################################################################&lt;BR /&gt;#&lt;BR /&gt;#&lt;BR /&gt;# Authentication management&lt;BR /&gt;#&lt;BR /&gt;login      auth required     libpam_hpsec.so.1&lt;BR /&gt;login      auth sufficient   libpam_krb5.so.1 debug&lt;BR /&gt;login      auth required     libpam_unix.so.1 try_first_pass&lt;BR /&gt;su         auth required     libpam_hpsec.so.1&lt;BR /&gt;su         auth sufficient   libpam_krb5.so.1&lt;BR /&gt;su         auth required     libpam_unix.so.1 try_first_pass&lt;BR /&gt;dtlogin    auth required     libpam_hpsec.so.1&lt;BR /&gt;dtlogin    auth sufficient   libpam_krb5.so.1&lt;BR /&gt;dtlogin    auth required     libpam_unix.so.1 try_first_pass&lt;BR /&gt;dtaction   auth required     libpam_hpsec.so.1&lt;BR /&gt;dtaction   auth sufficient   libpam_krb5.so.1&lt;BR /&gt;dtaction   auth required     libpam_unix.so.1 try_first_pass&lt;BR /&gt;ftp        auth required     libpam_hpsec.so.1&lt;BR /&gt;ftp        auth sufficient   libpam_krb5.so.1&lt;BR /&gt;ftp        auth required     libpam_unix.so.1 try_first_pass&lt;BR /&gt;OTHER      auth required     libpam_unix.so.1&lt;BR /&gt;#&lt;BR /&gt;# Account management&lt;BR /&gt;#&lt;BR /&gt;login      account required    libpam_hpsec.so.1&lt;BR /&gt;login      account sufficient  libpam_krb5.so.1&lt;BR /&gt;login      account required    libpam_unix.so.1&lt;BR /&gt;su         account required    libpam_hpsec.so.1&lt;BR /&gt;su         account sufficient  libpam_krb5.so.1&lt;BR /&gt;su         account required    libpam_unix.so.1&lt;BR /&gt;dtlogin    account required    libpam_hpsec.so.1&lt;BR /&gt;dtlogin    account sufficient  libpam_krb5.so.1&lt;BR /&gt;dtlogin    account required    libpam_unix.so.1&lt;BR /&gt;dtaction   account required    libpam_hpsec.so.1&lt;BR /&gt;dtaction   account sufficient  libpam_krb5.so.1&lt;BR /&gt;dtaction   account required    libpam_unix.so.1&lt;BR /&gt;ftp        account required     libpam_hpsec.so.1&lt;BR /&gt;ftp        account sufficient  libpam_krb5.so.1&lt;BR /&gt;ftp        account required    libpam_unix.so.1&lt;BR /&gt;OTHER      account required    libpam_unix.so.1&lt;BR /&gt;#&lt;BR /&gt;# Session management&lt;BR /&gt;#&lt;BR /&gt;login      session required    libpam_hpsec.so.1&lt;BR /&gt;login      session sufficient  libpam_krb5.so.1&lt;BR /&gt;login      session required    libpam_unix.so.1&lt;BR /&gt;dtlogin    session required    libpam_hpsec.so.1&lt;BR /&gt;dtlogin    session sufficient  libpam_krb5.so.1&lt;BR /&gt;dtlogin    session required    libpam_unix.so.1&lt;BR /&gt;dtaction   session required    libpam_hpsec.so.1&lt;BR /&gt;dtaction   session sufficient  libpam_krb5.so.1&lt;BR /&gt;dtaction   session required    libpam_unix.so.1&lt;BR /&gt;OTHER      session required    libpam_unix.so.1&lt;BR /&gt;#&lt;BR /&gt;# Password management&lt;BR /&gt;#&lt;BR /&gt;login      password required    libpam_updbe.so.1&lt;BR /&gt;login      password required    libpam_hpsec.so.1&lt;BR /&gt;login      password required    libpam_krb5.so.1 debug&lt;BR /&gt;login      password required    libpam_unix.so.1&lt;BR /&gt;#&lt;BR /&gt;##login      password required    libpam_hpsec.so.1&lt;BR /&gt;##login      password sufficient  libpam_krb5.so.1&lt;BR /&gt;##login      password required    libpam_unix.so.1&lt;BR /&gt;passwd     password required    libpam_hpsec.so.1&lt;BR /&gt;passwd     password sufficient  libpam_krb5.so.1&lt;BR /&gt;passwd     password required    libpam_unix.so.1&lt;BR /&gt;dtlogin    password required    libpam_hpsec.so.1&lt;BR /&gt;dtlogin    password sufficient  libpam_krb5.so.1&lt;BR /&gt;dtlogin    password required    libpam_unix.so.1&lt;BR /&gt;dtaction   password required    libpam_hpsec.so.1&lt;BR /&gt;dtaction   password sufficient  libpam_krb5.so.1&lt;BR /&gt;dtaction   password required    libpam_unix.so.1&lt;BR /&gt;OTHER      password required    libpam_unix.so.1&lt;BR /&gt;hpux /etc #&lt;BR /&gt;&lt;BR /&gt;================================================================&lt;BR /&gt;&lt;BR /&gt;hpux /etc # cat pam_user.conf&lt;BR /&gt;#&lt;BR /&gt;# This file defines PAM configuration for a user. The configuration&lt;BR /&gt;# here overrides pam.conf.&lt;BR /&gt;#&lt;BR /&gt;# The format for each entry is:&lt;BR /&gt;# user_name  module_type  module_path options&lt;BR /&gt;#&lt;BR /&gt;# For example:&lt;BR /&gt;#&lt;BR /&gt;# user_a        auth      /usr/lib/security/$ISA/libpam_unix.so.1     debug&lt;BR /&gt;# user_a        auth      /usr/lib/security/$ISA/libpam_dce.so.1      try_first_pass&lt;BR /&gt;# user_a        password  /usr/lib/security/$ISA/libpam_unix.so.1     debug&lt;BR /&gt;#&lt;BR /&gt;# user_b        auth      /usr/lib/security/$ISA/libpam_unix.so.1     debug use_psd&lt;BR /&gt;# user_b        password  /usr/lib/security/$ISA/libpam_unix.so.1     debug use_psd&lt;BR /&gt;#&lt;BR /&gt;#&lt;BR /&gt;# Note: For PA applications /usr/lib/security/&lt;MODULE_NAME&gt;.so.1&lt;BR /&gt;# should be a symbolic link to an appropriate PA PAM module.&lt;BR /&gt;#&lt;BR /&gt;# See the pam_user.conf(4) manual page for more information&lt;BR /&gt;#&lt;BR /&gt;root    auth            /usr/lib/security/libpam_krb5.so.1 ignore&lt;BR /&gt;root    password        /usr/lib/security/libpam_krb5.so.1 ignore&lt;BR /&gt;hpux /etc #&lt;BR /&gt;&lt;BR /&gt;=================================================================&lt;BR /&gt;&lt;BR /&gt;hpux /etc # kinit teste1&lt;BR /&gt;Password for teste1@LDAP.TESTE:&lt;BR /&gt;&lt;BR /&gt;hpux /etc # klist&lt;BR /&gt;Ticket cache: FILE:/tmp/krb5cc_0&lt;BR /&gt;Default principal: teste1@LDAP.TESTE&lt;BR /&gt;&lt;BR /&gt;Valid starting     Expires            Service principal&lt;BR /&gt;12/07/08 10:33:58  12/07/08 20:33:58  krbtgt/LDAP.TESTE@LDAP.TESTE&lt;BR /&gt;hpux /etc #&lt;BR /&gt;&lt;BR /&gt;==================================================================&lt;BR /&gt;&lt;BR /&gt;hpux /etc # swlist -l bundle | grep -i krb&lt;BR /&gt;  KRB5CLIENT            D.1.6.2        Kerberos V5 Client Version 1.6.2&lt;BR /&gt;hpux /etc #&lt;BR /&gt;&lt;BR /&gt;==================================================================&lt;BR /&gt;&lt;BR /&gt;hpux /etc # ll /etc/krb5.keytab&lt;BR /&gt;-rw-------   1 root       sys             72 Dec  4 18:32 /etc/krb5.keytab&lt;BR /&gt;&lt;BR /&gt;hpux /etc # strings /etc/krb5.keytab&lt;BR /&gt;LDAP.TESTE&lt;BR /&gt;host&lt;BR /&gt;hpux.ldap.teste&lt;BR /&gt;6GEJP&lt;BR /&gt;hpux /etc #&lt;BR /&gt;&lt;BR /&gt;==================================================================&lt;BR /&gt;&lt;BR /&gt;syslog.log&lt;BR /&gt;&lt;BR /&gt;Dec  5 16:37:47 hpux sshd[7555]: Invalid user teste1 from 100.100.100.161&lt;BR /&gt;Dec  5 16:37:47 hpux sshd[7555]: Failed none for invalid user teste1 from 100.100.100.161 port 55197 ssh2&lt;BR /&gt;Dec  5 16:37:52 hpux sshd[7555]: error: PAM: No account present for user for illegal user teste1 from 100.100.100.161&lt;BR /&gt;Dec  5 16:37:52 hpux sshd[7555]: Failed keyboard-interactive/pam for invalid user teste1 from 100.100.100.161 port 55197 ssh2&lt;BR /&gt;Dec  5 16:38:08 hpux sshd[7555]: error: PAM: No account present for user for illegal user teste1 from 100.100.100.161&lt;BR /&gt;Dec  5 16:38:08 hpux sshd[7555]: Failed keyboard-interactive/pam for invalid user teste1 from 100.100.100.161 port 55197 ssh2&lt;BR /&gt;Dec  5 15:58:22 hpux login: [No account present for user] Password not valid&lt;BR /&gt;Dec  5 17:16:58 hpux sshd[13657]: Did not receive identification string from UNKNOWN&lt;BR /&gt;Dec  5 17:20:48 hpux sshd[14158]: Invalid user teste1 from 100.100.100.161&lt;BR /&gt;Dec  5 17:20:48 hpux sshd[14158]: Failed none for invalid user teste1 from 100.100.100.161 port 39946 ssh2&lt;BR /&gt;Dec  5 17:20:53 hpux sshd[14158]: error: PAM: No account present for user for illegal user teste1 from 100.100.100.161&lt;BR /&gt;Dec  5 17:20:53 hpux sshd[14158]: Failed keyboard-interactive/pam for invalid user teste1 from 100.100.100.161 port 39946 ssh2&lt;BR /&gt;&lt;BR /&gt;===================================================================&lt;BR /&gt;&lt;BR /&gt;hpux / # swlist -l product| grep -i kerb&lt;BR /&gt;  KRB5-Client           B.11.23        Kerberos V5 Client Version 1.0&lt;BR /&gt;  PAM-Kerberos          C.01.24        PAM-Kerberos Version 1.24&lt;BR /&gt;  krb5client            D.1.6.2        Kerberos V5 Client Version 1.6.2&lt;BR /&gt;hpux / #&lt;BR /&gt;&lt;BR /&gt;===================================================================&lt;BR /&gt;&lt;BR /&gt;&lt;/MODULE_NAME&gt;</description>
      <pubDate>Tue, 09 Dec 2008 12:08:42 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/ldap-problems/m-p/4319192#M651932</guid>
      <dc:creator>Fernando Jose P de Souz</dc:creator>
      <dc:date>2008-12-09T12:08:42Z</dc:date>
    </item>
    <item>
      <title>Re: LDAP Problems</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/ldap-problems/m-p/4319193#M651933</link>
      <description>Fernando,&lt;BR /&gt;Did you get feedback on this issue? I am facing a similar problem and I am interested in a possible solution.</description>
      <pubDate>Wed, 11 Nov 2009 19:17:00 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/ldap-problems/m-p/4319193#M651933</guid>
      <dc:creator>Noe M Hoyos</dc:creator>
      <dc:date>2009-11-11T19:17:00Z</dc:date>
    </item>
    <item>
      <title>Re: LDAP Problems</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/ldap-problems/m-p/4319194#M651934</link>
      <description>Hi Fernando&lt;BR /&gt;&lt;BR /&gt;&lt;A href="http://forums13.itrc.hp.com/service/forums/questionanswer.do?threadId=1381465" target="_blank"&gt;http://forums13.itrc.hp.com/service/forums/questionanswer.do?threadId=1381465&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;The above link contains links to manuals, a cookbook whitepaper on setting it up, notes on Kerberos / pam configuration, and notes about Windows (release, rights and so on).&lt;BR /&gt;&lt;BR /&gt;Might be of use.&lt;BR /&gt;&lt;BR /&gt;Thanks,&lt;BR /&gt;Johnson</description>
      <pubDate>Sat, 14 Nov 2009 08:08:18 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/ldap-problems/m-p/4319194#M651934</guid>
      <dc:creator>Johnson Punniyalingam</dc:creator>
      <dc:date>2009-11-14T08:08:18Z</dc:date>
    </item>
  </channel>
</rss>

