<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ssh pam kerberos: key-based authentication in Operating System - HP-UX</title>
    <link>https://community.hpe.com/t5/operating-system-hp-ux/ssh-pam-kerberos-key-based-authentication/m-p/3646127#M742338</link>
    <description>PubkeyAuthentication in sshd_config file to no. Restart sshd and your requirement will work.&lt;BR /&gt;&lt;BR /&gt;hth.</description>
    <pubDate>Tue, 11 Oct 2005 02:08:31 GMT</pubDate>
    <dc:creator>Muthukumar_5</dc:creator>
    <dc:date>2005-10-11T02:08:31Z</dc:date>
    <item>
      <title>ssh pam kerberos: key-based authentication</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/ssh-pam-kerberos-key-based-authentication/m-p/3646125#M742336</link>
      <description>We are looking to have a transparrent migration to kerberos authentication&lt;BR /&gt;Note: complete migration to LDAP is not possible at this moment&lt;BR /&gt;&lt;BR /&gt;description of the current situation:&lt;BR /&gt;The KDC is a windows server&lt;BR /&gt;Users are still created on unix but will be dissabled on unix&lt;BR /&gt;users can still authenticate through kerberos when using ssh (pam.conf)&lt;BR /&gt;kerberos authentication for root is dissabled (pam_user.conf)&lt;BR /&gt;&lt;BR /&gt;problem: when a user uses key-based authentication he still gets authenticated even if he is disabled in kerberos&lt;BR /&gt;Is there a way to block ssh-key-based authentication if the user is disabled?</description>
      <pubDate>Tue, 11 Oct 2005 01:56:22 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/ssh-pam-kerberos-key-based-authentication/m-p/3646125#M742336</guid>
      <dc:creator>TEC-HP</dc:creator>
      <dc:date>2005-10-11T01:56:22Z</dc:date>
    </item>
    <item>
      <title>Re: ssh pam kerberos: key-based authentication</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/ssh-pam-kerberos-key-based-authentication/m-p/3646126#M742337</link>
      <description>Check sshd_config. you can set preferred authentication method.</description>
      <pubDate>Tue, 11 Oct 2005 02:06:31 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/ssh-pam-kerberos-key-based-authentication/m-p/3646126#M742337</guid>
      <dc:creator>RAC_1</dc:creator>
      <dc:date>2005-10-11T02:06:31Z</dc:date>
    </item>
    <item>
      <title>Re: ssh pam kerberos: key-based authentication</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/ssh-pam-kerberos-key-based-authentication/m-p/3646127#M742338</link>
      <description>PubkeyAuthentication in sshd_config file to no. Restart sshd and your requirement will work.&lt;BR /&gt;&lt;BR /&gt;hth.</description>
      <pubDate>Tue, 11 Oct 2005 02:08:31 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/ssh-pam-kerberos-key-based-authentication/m-p/3646127#M742338</guid>
      <dc:creator>Muthukumar_5</dc:creator>
      <dc:date>2005-10-11T02:08:31Z</dc:date>
    </item>
    <item>
      <title>Re: ssh pam kerberos: key-based authentication</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/ssh-pam-kerberos-key-based-authentication/m-p/3646128#M742339</link>
      <description>key based authentication should still work for batch users: unless the batch user has expired and has been dissabled in the KDC.&lt;BR /&gt;&lt;BR /&gt;So: I'm looking fo a way to intoregate the kerbeos server to check if a user is dissabled &lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Tue, 11 Oct 2005 02:12:52 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/ssh-pam-kerberos-key-based-authentication/m-p/3646128#M742339</guid>
      <dc:creator>TEC-HP</dc:creator>
      <dc:date>2005-10-11T02:12:52Z</dc:date>
    </item>
    <item>
      <title>Re: ssh pam kerberos: key-based authentication</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/ssh-pam-kerberos-key-based-authentication/m-p/3646129#M742340</link>
      <description>You probably need to start tweaking your pam.conf file, so that kerberos authentication is required.  By default, that file only makes kerberos "sufficient", so a failure does not prevent a user from authenticating.&lt;BR /&gt;&lt;BR /&gt;Of course, then you have to work out how to let root login, without kerberos.&lt;BR /&gt;&lt;BR /&gt;I've never worked with kerberos, so can't give you specific steps.  But that seems to me the direction you want to look in.&lt;BR /&gt;</description>
      <pubDate>Tue, 18 Oct 2005 10:53:35 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/ssh-pam-kerberos-key-based-authentication/m-p/3646129#M742340</guid>
      <dc:creator>Brian Miller_9</dc:creator>
      <dc:date>2005-10-18T10:53:35Z</dc:date>
    </item>
  </channel>
</rss>

