- Community Home
- >
- Servers and Operating Systems
- >
- Operating Systems
- >
- Operating System - HP-UX
- >
- PAM-Kerberos and ADS
Categories
Company
Local Language
Forums
Discussions
Forums
- Data Protection and Retention
- Entry Storage Systems
- Legacy
- Midrange and Enterprise Storage
- Storage Networking
- HPE Nimble Storage
Discussions
Forums
Discussions
Discussions
Forums
Discussions
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
- BladeSystem Infrastructure and Application Solutions
- Appliance Servers
- Alpha Servers
- BackOffice Products
- Internet Products
- HPE 9000 and HPE e3000 Servers
- Networking
- Netservers
- Secure OS Software for Linux
- Server Management (Insight Manager 7)
- Windows Server 2003
- Operating System - Tru64 Unix
- ProLiant Deployment and Provisioning
- Linux-Based Community / Regional
- Microsoft System Center Integration
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Community
Resources
Forums
Blogs
- Subscribe to RSS Feed
- Mark Topic as New
- Mark Topic as Read
- Float this Topic for Current User
- Bookmark
- Subscribe
- Printer Friendly Page
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
08-25-2004 09:09 AM
08-25-2004 09:09 AM
I managed to get my UX box successfully authenticate logins against the windows 2000 ADS.
But the issue here is, I have users from multiple domains that log on to the system.
I got this working for one domain and I was wondering if anybody managed to get this working for multiple domains.
In other words, I have domains dom1 , dom2 and dom3. user1 from dom1 is able to log on to UX box with ADS password. Now I would like my user2 from dom2 be able to login to the system with the ADS password.
Any inputs?
TIA
Sundar.
Solved! Go to Solution.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
08-25-2004 10:34 AM
08-25-2004 10:34 AM
Re: PAM-Kerberos and ADS
This is documented in chapter 3 "Active Directory Multiple Domains" of the
"LDAP-UX Client Services B.03.30 with Microsoft Windows 2000 Active Directory Administrator's Guide"
which can be found at:
http://www.docs.hp.com/hpux/onlinedocs/J4269-90039/J4269-90039.html
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
08-25-2004 12:20 PM
08-25-2004 12:20 PM
Re: PAM-Kerberos and ADS
I configured Kerberos client and /etc/pam.conf with the PAM-Kerberos library and that is it.
I didnt have to touch the LDAP client configuration at all.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
08-26-2004 03:22 AM
08-26-2004 03:22 AM
Re: PAM-Kerberos and ADS
In this case PAM Kerberos does not know what REALM (domain) the user belongs to so it can not authenticate the user.
For example if you have 2 Win2K users: jcool@WEST.ACME.COM and jcool@EAST.ACME.COM
on the HP-UX system the user will attempt to login as jcool, which one is he?
LDAP-UX and PAM Kerberos work together to identify which REALM/domain the user is from and authenticates the user to that domain. 1 local and multiple remote REALMS/domains are configured for this to work (explained in the manual).
If all of your users use the root REALM in their UPN i.e. jcool@ACME.COM then you should be able to configure PAM Kerberos to use just the ACME.COM REALM and authenticate all users.
Cheers,
Doug
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
08-26-2004 03:30 AM
08-26-2004 03:30 AM
Re: PAM-Kerberos and ADS
Even then it is not possible to authenticate the users using PAM-Kerberos ?. I dont use LDAP for user information. User information is stored locally in the /etc/passwd file.
How about if I list all the REALMS in the /etc/krb4.conf file. Will PAM try the KDC servers in the order listed or it will quit after trying the default REALM ?
If the domains are trusted, can the KDC for sub1.domain.com provide the tickets for the users in sub2.domain.com ?
Anyone ?
-- Sundar.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
08-26-2004 03:44 AM
08-26-2004 03:44 AM
SolutionCross realm authentication is possible outside of PAM Kerberos, once you have a TGT for your "local" REALM.