summaryrefslogtreecommitdiffstats
path: root/server
diff options
context:
space:
mode:
authorJonathan Bauer2015-01-28 17:44:51 +0100
committerJonathan Bauer2015-01-28 17:44:51 +0100
commit461cf7424be1cc4aca417c16cdb6e10fd25ad5d7 (patch)
tree2abd295eb9a191d183badb9d48923a65f3f1dd15 /server
parent[sssd] new module for sssd, work in progress. (diff)
downloadtm-scripts-461cf7424be1cc4aca417c16cdb6e10fd25ad5d7.tar.gz
tm-scripts-461cf7424be1cc4aca417c16cdb6e10fd25ad5d7.tar.xz
tm-scripts-461cf7424be1cc4aca417c16cdb6e10fd25ad5d7.zip
[sssd-freiburg] new config.tgz module for the sssd stuff
Diffstat (limited to 'server')
-rw-r--r--server/modules/sssd-freiburg/etc/nsswitch.conf19
-rw-r--r--server/modules/sssd-freiburg/etc/pam.d/common-account26
-rw-r--r--server/modules/sssd-freiburg/etc/pam.d/common-auth28
-rw-r--r--server/modules/sssd-freiburg/etc/pam.d/common-session37
-rw-r--r--server/modules/sssd-freiburg/etc/sssd/sssd.conf60
5 files changed, 170 insertions, 0 deletions
diff --git a/server/modules/sssd-freiburg/etc/nsswitch.conf b/server/modules/sssd-freiburg/etc/nsswitch.conf
new file mode 100644
index 00000000..94e5c180
--- /dev/null
+++ b/server/modules/sssd-freiburg/etc/nsswitch.conf
@@ -0,0 +1,19 @@
+# /etc/nsswitch.conf
+#
+# Example configuration of GNU Name Service Switch functionality.
+# If you have the `glibc-doc-reference' and `info' packages installed, try:
+# `info libc "Name Service Switch"' for information about this file.
+
+passwd: cache compat sss
+group: cache compat sss
+shadow: compat
+
+hosts: files mdns4_minimal [NOTFOUND=return] dns mdns4
+networks: files
+
+protocols: db files
+services: db files
+ethers: db files
+rpc: db files
+
+netgroup: nis
diff --git a/server/modules/sssd-freiburg/etc/pam.d/common-account b/server/modules/sssd-freiburg/etc/pam.d/common-account
new file mode 100644
index 00000000..179158f7
--- /dev/null
+++ b/server/modules/sssd-freiburg/etc/pam.d/common-account
@@ -0,0 +1,26 @@
+#
+# /etc/pam.d/common-account - authorization settings common to all services
+#
+# This file is included from other service-specific PAM config files,
+# and should contain a list of the authorization modules that define
+# the central access policy for use on the system. The default is to
+# only deny service to users whose accounts are expired in /etc/shadow.
+#
+# As of pam 1.0.1-6, this file is managed by pam-auth-update by default.
+# To take advantage of this, it is recommended that you configure any
+# local modules either before or after the default block, and use
+# pam-auth-update to manage selection of other modules. See
+# pam-auth-update(8) for details.
+#
+
+# here are the per-package modules (the "Primary" block)
+account [success=2 new_authtok_reqd=done default=ignore] pam_unix.so
+account [success=1 new_authtok_reqd=done default=ignore] pam_sss.so use_first_pass
+# here's the fallback if no module succeeds
+account requisite pam_deny.so
+# prime the stack with a positive return value if there isn't one already;
+# this avoids us returning an error just because nothing sets a success code
+# since the modules above will each just jump around
+account required pam_permit.so
+# and here are more per-package modules (the "Additional" block)
+# end of pam-auth-update config
diff --git a/server/modules/sssd-freiburg/etc/pam.d/common-auth b/server/modules/sssd-freiburg/etc/pam.d/common-auth
new file mode 100644
index 00000000..e04c5c74
--- /dev/null
+++ b/server/modules/sssd-freiburg/etc/pam.d/common-auth
@@ -0,0 +1,28 @@
+#
+# /etc/pam.d/common-auth - authentication settings common to all services
+#
+# This file is included from other service-specific PAM config files,
+# and should contain a list of the authentication modules that define
+# the central authentication scheme for use on the system
+# (e.g., /etc/shadow, LDAP, Kerberos, etc.). The default is to use the
+# traditional Unix authentication mechanisms.
+#
+# As of pam 1.0.1-6, this file is managed by pam-auth-update by default.
+# To take advantage of this, it is recommended that you configure any
+# local modules either before or after the default block, and use
+# pam-auth-update to manage selection of other modules. See
+# pam-auth-update(8) for details.
+
+# here are the per-package modules (the "Primary" block)
+auth [success=ok default=ignore] pam_krb5.so minimum_uid=1000
+auth [success=2 default=ignore] pam_unix.so try_first_pass
+auth [success=1 default=ignore] pam_sss.so use_first_pass
+# here's the fallback if no module succeeds
+auth requisite pam_deny.so
+auth optional pam_script.so expose=1
+# prime the stack with a positive return value if there isn't one already;
+# this avoids us returning an error just because nothing sets a success code
+# since the modules above will each just jump around
+auth required pam_permit.so
+# and here are more per-package modules (the "Additional" block)
+# end of pam-auth-update config
diff --git a/server/modules/sssd-freiburg/etc/pam.d/common-session b/server/modules/sssd-freiburg/etc/pam.d/common-session
new file mode 100644
index 00000000..be55be0d
--- /dev/null
+++ b/server/modules/sssd-freiburg/etc/pam.d/common-session
@@ -0,0 +1,37 @@
+#
+# /etc/pam.d/common-session - session-related modules common to all services
+#
+# This file is included from other service-specific PAM config files,
+# and should contain a list of modules that define tasks to be performed
+# at the start and end of sessions of *any* kind (both interactive and
+# non-interactive).
+#
+# As of pam 1.0.1-6, this file is managed by pam-auth-update by default.
+# To take advantage of this, it is recommended that you configure any
+# local modules either before or after the default block, and use
+# pam-auth-update to manage selection of other modules. See
+# pam-auth-update(8) for details.
+
+# here are the per-package modules (the "Primary" block)
+session [default=1] pam_permit.so
+# here's the fallback if no module succeeds
+session requisite pam_deny.so
+# prime the stack with a positive return value if there isn't one already;
+# this avoids us returning an error just because nothing sets a success code
+# since the modules above will each just jump around
+session required pam_permit.so
+# The pam_umask module will set the umask according to the system default in
+# /etc/login.defs and user settings, solving the problem of different
+# umask settings with different shells, display managers, remote sessions etc.
+# See "man pam_umask".
+session optional pam_umask.so
+# and here are more per-package modules (the "Additional" block)
+session required pam_systemd.so
+session optional pam_env.so readenv=1
+session optional pam_env.so readenv=1 envfile=/etc/default/locale
+session optional pam_krb5.so minimum_uid=1000
+session [success=1] pam_unix.so
+session [success=ok] pam_sss.so
+session sufficient pam_script.so
+session optional pam_mkhomedir.so skel=/etc/skel umask=0022
+# end of pam-auth-update config
diff --git a/server/modules/sssd-freiburg/etc/sssd/sssd.conf b/server/modules/sssd-freiburg/etc/sssd/sssd.conf
new file mode 100644
index 00000000..7b3d7b51
--- /dev/null
+++ b/server/modules/sssd-freiburg/etc/sssd/sssd.conf
@@ -0,0 +1,60 @@
+[sssd]
+config_file_version = 2
+services = nss, pam
+#debug_level = 0xffff
+# SSSD will not start if you do not configure any domains.
+# Add new domain configurations as [domain/<NAME>] sections, and
+# then add the list of domains (in the order you want them to be
+# queried) to the "domains" attribute below and uncomment it.
+domains = LDAP
+
+[nss]
+filter_users = root,ldap,named,avahi,haldaemon,dbus,radiusd,news,nscd,demo
+
+[pam]
+
+# Example LDAP domain
+[domain/LDAP]
+id_provider = ldap
+auth_provider = ldap
+ldap_tls_reqcert = never
+# ldap_schema can be set to "rfc2307", which stores group member names in the
+# "memberuid" attribute, or to "rfc2307bis", which stores group member DNs in
+# the "member" attribute. If you do not know this value, ask your LDAP
+# administrator.
+ldap_schema = rfc2307bis
+ldap_uri = ldaps://ldap.ruf.uni-freiburg.de
+ldap_backup_uri = ldaps://bv1.ruf.uni-freiburg.de,ldaps://bv2.ruf.uni-freiburg.de,ldaps://bv3.ruf.uni-freiburg.de
+ldap_group_search_base = ou=group,dc=uni-freiburg,dc=de
+ldap_user_search_base = ou=people,dc=uni-freiburg,dc=de
+ldap_user_home_directory = rufClientHome
+ldap_search_base = ou=people,dc=uni-freiburg,dc=de
+# Note that enabling enumeration will have a moderate performance impact.
+# Consequently, the default value for enumeration is FALSE.
+# Refer to the sssd.conf man page for full details.
+; enumerate = false
+# Allow offline logins by locally storing password hashes (default: false).
+cache_credentials = true
+
+# An example Active Directory domain. Please note that this configuration
+# works for AD 2003R2 and AD 2008, because they use pretty much RFC2307bis
+# compliant attribute names. To support UNIX clients with AD 2003 or older,
+# you must install Microsoft Services For Unix and map LDAP attributes onto
+# msSFU30* attribute names.
+;[domain/AD]
+;id_provider = ldap
+;auth_provider = krb5
+;chpass_provider = krb5
+
+;ldap_uri = ldaps://bv1.ruf.uni-freiburg.de ldaps://bv2.ruf.uni-freiburg.de ldaps://bv3.ruf.uni-freiburg.de
+;ldap_search_base = ou=people,dc=uni-freiburg,dc=de
+;ldap_schema = rfc2307bis
+;ldap_sasl_mech = GSSAPI
+;ldap_user_object_class = user
+;ldap_group_object_class = group
+;ldap_user_principal = userPrincipalName
+;ldap_account_expire_policy = ad
+;ldap_force_upper_case_realm = true
+;
+; krb5_server = your.ad.example.com
+; krb5_realm = EXAMPLE.COM