[OpenAFS] pam_afs_session and winbind
Ben Howell
howellbp@gmail.com
Thu, 30 Aug 2012 18:54:32 -0500
While this is true, people who get paid a lot more than I do decided we
shouldn't be pointing authentication to individual machines and instead
use domain lookups, which winbind does nicely. I was able to replicate
the old functionality by pointing the pam stack directly to
dc01.domain.com, but that defeats the purpose of having a decentralized
authentication system. OpenLDAP was decentralized, but we were using a
load balancer that allowed one address to point to multiple machines
(ldap.domain and kerberos.domain); apparently this isn't possible with
ActiveDirectory, we can't have just one IP and host name for all of our
domain controllers.
kinit and aklog still work as they're supposed to, as does pagsh, after
the user is logged in. I'm also able to make GSSAPI play nice, in that
any user who already has kerberos tickets will transfer those tickets
AND get an AFS token on whatever server they log into.
- Ben
On 8/30/12 6:41 PM, Russ Allbery wrote:
> Ben Howell <howellbp@gmail.com> writes:
>
>> Is it possible to reproduce the combination of pam_krb5 and
>> pam_afs_session to create a PAG and generate a ticket and AFS token on
>> login using winbind's KRB5 mechanism? I think at this point the only
>> thing I haven't done is write my own module from scratch; I've tried
>> every pam stack combination I can think of, and the ones that work don't
>> generate a ticket or token. Is this just a pipe dream, or is it actually
>> possible, and I'm looking in the wrong place?
> I don't know a lot about Winbind, so this may be a naive question, but why
> are you using it for authentication instead of just continuing to use
> pam_krb5? Active Directory is a perfectly capable Kerberos KDC that
> responds to the same protocol as any other Kerberos KDC.
>