Index: openacs-4/packages/acs-authentication/www/doc/ext-auth-pam-install.html =================================================================== RCS file: /usr/local/cvsroot/openacs-4/packages/acs-authentication/www/doc/ext-auth-pam-install.html,v diff -u -r1.4 -r1.4.6.1 --- openacs-4/packages/acs-authentication/www/doc/ext-auth-pam-install.html 19 Feb 2004 14:59:42 -0000 1.4 +++ openacs-4/packages/acs-authentication/www/doc/ext-auth-pam-install.html 9 Jan 2006 06:32:08 -0000 1.4.6.1 @@ -1,14 +1,14 @@ -Installing PAM support

Installing PAM support

OpenACS supports PAM authetication via the ns_pam module in AOLserver.

  1. Add PAM support to AOLserver.�OpenACS supports PAM support via the PAM AOLserver +Using Pluggable Authentication Modules (PAM) with OpenACS

    Using Pluggable Authentication Modules (PAM) with OpenACS

    OpenACS supports PAM authetication via the ns_pam module in AOLserver.

    1. Add PAM support to AOLserver.�OpenACS supports PAM support via the PAM AOLserver module. PAM is system of modular support, and can provide local (unix password), RADIUS, LDAP (more information), and other forms of authentication. Note that due to security issues, the AOLserver PAM module cannot be used for local password authentication.

      1. Compile and install ns_pam.�Download the tarball to - /tmp.

        Debian users: first do apt-get install libpam-dev

        [root@yourserver root]# cd /usr/local/src/aolserver
        -[root@yourserver aolserver]# tar xzf /tmp/ns_pam-0.1.tar.gz
        -[root@yourserver aolserver]# cd nspam
        -[root@yourserver nspam]# make
        +            /tmp.

        Debian users: first do apt-get install libpam-dev

        [root@yourserver root]# cd /usr/local/src/aolserver
        +[root@yourserver aolserver]# tar xzf /tmp/ns_pam-0.1.tar.gz
        +[root@yourserver aolserver]# cd nspam
        +[root@yourserver nspam]# make
         gcc -I/usr/include/pam -I/usr/local/aolserver/include -D_REENTRANT=1 
           -DNDEBUG=1 -g -fPIC -Wall -Wno-unused -mcpu=i686 -DHAVE_CMMSG=1 
           -DUSE_FIONREAD=1 -DHAVE_COND_EINTR=1   -c -o nspam.o nspam.c
        @@ -20,7 +20,7 @@
           -DUSE_FIONREAD=1 -DHAVE_COND_EINTR=1   -c -o pam_support.o pam_support.c
         /bin/rm -f nspam.so
         gcc -shared -nostartfiles -o nspam.so nspam.o pam_support.o -lpam
        -[root@yourserver nspam]# make install
        +[root@yourserver nspam]# make install
         [root@yourserver nspam]#
         cd /usr/local/src/aolserver
         tar xzf /tmp/ns_pam-0.1.tar.gz
        @@ -36,33 +36,33 @@
                       perform new types of authentication.
         

        • RADIUS in PAM.�

          1. Untar the pam_radius tarball and compile and install. (more - information)

            [root@yourserver root]# cd /usr/local/src/
            -[root@yourserver src]# tar xf /tmp/pam_radius-1.3.16.tar
            -[root@yourserver src]# cd pam_radius-1.3.16
            -[root@yourserver pam_radius-1.3.16]# make
            +                    information)

            [root@yourserver root]# cd /usr/local/src/
            +[root@yourserver src]# tar xf /tmp/pam_radius-1.3.16.tar
            +[root@yourserver src]# cd pam_radius-1.3.16
            +[root@yourserver pam_radius-1.3.16]# make
             cc -Wall -fPIC -c pam_radius_auth.c -o pam_radius_auth.o
             cc -Wall -fPIC   -c -o md5.o md5.c
             ld -Bshareable pam_radius_auth.o md5.o -lpam -o pam_radius_auth.so
            -[root@yourserver pam_radius-1.3.16]# cp pam_radius_auth.so /lib/security/pam_radius_auth.so
            +[root@yourserver pam_radius-1.3.16]# cp pam_radius_auth.so /lib/security/pam_radius_auth.so
             [root@yourserver pam_radius-1.3.16]#
             cd /usr/local/src/
             tar xf /tmp/pam_radius-1.3.16.tar
             cd pam_radius-1.3.16
             make
            -cp pam_radius_auth.so /lib/security/pam_radius_auth.so

            Debian users: apt-get install libpam-radius-auth

          2. Set up the PAM domain. Recent PAM +cp pam_radius_auth.so /lib/security/pam_radius_auth.so

        Debian users: apt-get install libpam-radius-auth

      2. Set up the PAM domain. Recent PAM distributions have a different file for each domain, - all in /etc/pam.d. + all in /etc/pam.d. Previous PAM setups put all domain configuration lines into a single file, - /etc/pam.conf. On + /etc/pam.conf. On Red Hat, create the file - /etc/pam.d/service0 + /etc/pam.d/service0 with these contents:

        auth       sufficient   /lib/security/pam_radius_auth.so
         
      3. Modify the AOLserver configuration file to use this PAM domain. Edit the line

        ns_param   PamDomain             "service0"

        So that the value of the parameter matches the name (just the file name, not the fully pathed name) of the domain file in

        /etc/pam.d/
    2. LDAP in PAM.�more information

  2. Modify the AOLserver configuration file to support ns_pam.�

    In - /var/lib/aolserver/service0/etc/config.tcl, enable the nspam module by uncommenting this line:

    ns_param   nspam           ${bindir}/nspam.so
  • Install auth-pam OpenACS service package.�Install auth-pam and restart the server.

  • Create an OpenACS authority.�OpenACS supports multiple authentication authorities. + /var/lib/aolserver/service0/etc/config.tcl, enable the nspam module by uncommenting this line:

    ns_param   nspam           ${bindir}/nspam.so
  • Install auth-pam OpenACS service package.�Install auth-pam and restart the server.

  • Create an OpenACS authority.�OpenACS supports multiple authentication authorities. The OpenACS server itself is the "Local Authority," used by default.

    1. Browse to the authentication administration page, - http://yourserver/acs-admin/auth/. - Create and name an authority (in the sitewide admin UI)

    2. Set Authentication to PAM.

    3. If the PAM domain defines a password command, you can set Password Management to PAM. If not, the PAM module cannot change the user's password and you should leave this option Disabled.

    4. Leave Account Registration disabed.

    5. Configure Batch Synchronization -

  • View comments on this page at openacs.org
    + http://yourserver/acs-admin/auth/. + Create and name an authority (in the sitewide admin UI)

  • Set Authentication to PAM.

  • If the PAM domain defines a password command, you can set Password Management to PAM. If not, the PAM module cannot change the user's password and you should leave this option Disabled.

  • Leave Account Registration disabed.

  • Configure Batch Synchronization +

  • View comments on this page at openacs.org