diff options
| author | Jonathan Bauer | 2015-01-28 17:44:51 +0100 |
|---|---|---|
| committer | Jonathan Bauer | 2015-01-28 17:44:51 +0100 |
| commit | 461cf7424be1cc4aca417c16cdb6e10fd25ad5d7 (patch) | |
| tree | 2abd295eb9a191d183badb9d48923a65f3f1dd15 /server | |
| parent | [sssd] new module for sssd, work in progress. (diff) | |
| download | tm-scripts-461cf7424be1cc4aca417c16cdb6e10fd25ad5d7.tar.gz tm-scripts-461cf7424be1cc4aca417c16cdb6e10fd25ad5d7.tar.xz tm-scripts-461cf7424be1cc4aca417c16cdb6e10fd25ad5d7.zip | |
[sssd-freiburg] new config.tgz module for the sssd stuff
Diffstat (limited to 'server')
| -rw-r--r-- | server/modules/sssd-freiburg/etc/nsswitch.conf | 19 | ||||
| -rw-r--r-- | server/modules/sssd-freiburg/etc/pam.d/common-account | 26 | ||||
| -rw-r--r-- | server/modules/sssd-freiburg/etc/pam.d/common-auth | 28 | ||||
| -rw-r--r-- | server/modules/sssd-freiburg/etc/pam.d/common-session | 37 | ||||
| -rw-r--r-- | server/modules/sssd-freiburg/etc/sssd/sssd.conf | 60 |
5 files changed, 170 insertions, 0 deletions
diff --git a/server/modules/sssd-freiburg/etc/nsswitch.conf b/server/modules/sssd-freiburg/etc/nsswitch.conf new file mode 100644 index 00000000..94e5c180 --- /dev/null +++ b/server/modules/sssd-freiburg/etc/nsswitch.conf @@ -0,0 +1,19 @@ +# /etc/nsswitch.conf +# +# Example configuration of GNU Name Service Switch functionality. +# If you have the `glibc-doc-reference' and `info' packages installed, try: +# `info libc "Name Service Switch"' for information about this file. + +passwd: cache compat sss +group: cache compat sss +shadow: compat + +hosts: files mdns4_minimal [NOTFOUND=return] dns mdns4 +networks: files + +protocols: db files +services: db files +ethers: db files +rpc: db files + +netgroup: nis diff --git a/server/modules/sssd-freiburg/etc/pam.d/common-account b/server/modules/sssd-freiburg/etc/pam.d/common-account new file mode 100644 index 00000000..179158f7 --- /dev/null +++ b/server/modules/sssd-freiburg/etc/pam.d/common-account @@ -0,0 +1,26 @@ +# +# /etc/pam.d/common-account - authorization settings common to all services +# +# This file is included from other service-specific PAM config files, +# and should contain a list of the authorization modules that define +# the central access policy for use on the system. The default is to +# only deny service to users whose accounts are expired in /etc/shadow. +# +# As of pam 1.0.1-6, this file is managed by pam-auth-update by default. +# To take advantage of this, it is recommended that you configure any +# local modules either before or after the default block, and use +# pam-auth-update to manage selection of other modules. See +# pam-auth-update(8) for details. +# + +# here are the per-package modules (the "Primary" block) +account [success=2 new_authtok_reqd=done default=ignore] pam_unix.so +account [success=1 new_authtok_reqd=done default=ignore] pam_sss.so use_first_pass +# here's the fallback if no module succeeds +account requisite pam_deny.so +# prime the stack with a positive return value if there isn't one already; +# this avoids us returning an error just because nothing sets a success code +# since the modules above will each just jump around +account required pam_permit.so +# and here are more per-package modules (the "Additional" block) +# end of pam-auth-update config diff --git a/server/modules/sssd-freiburg/etc/pam.d/common-auth b/server/modules/sssd-freiburg/etc/pam.d/common-auth new file mode 100644 index 00000000..e04c5c74 --- /dev/null +++ b/server/modules/sssd-freiburg/etc/pam.d/common-auth @@ -0,0 +1,28 @@ +# +# /etc/pam.d/common-auth - authentication settings common to all services +# +# This file is included from other service-specific PAM config files, +# and should contain a list of the authentication modules that define +# the central authentication scheme for use on the system +# (e.g., /etc/shadow, LDAP, Kerberos, etc.). The default is to use the +# traditional Unix authentication mechanisms. +# +# As of pam 1.0.1-6, this file is managed by pam-auth-update by default. +# To take advantage of this, it is recommended that you configure any +# local modules either before or after the default block, and use +# pam-auth-update to manage selection of other modules. See +# pam-auth-update(8) for details. + +# here are the per-package modules (the "Primary" block) +auth [success=ok default=ignore] pam_krb5.so minimum_uid=1000 +auth [success=2 default=ignore] pam_unix.so try_first_pass +auth [success=1 default=ignore] pam_sss.so use_first_pass +# here's the fallback if no module succeeds +auth requisite pam_deny.so +auth optional pam_script.so expose=1 +# prime the stack with a positive return value if there isn't one already; +# this avoids us returning an error just because nothing sets a success code +# since the modules above will each just jump around +auth required pam_permit.so +# and here are more per-package modules (the "Additional" block) +# end of pam-auth-update config diff --git a/server/modules/sssd-freiburg/etc/pam.d/common-session b/server/modules/sssd-freiburg/etc/pam.d/common-session new file mode 100644 index 00000000..be55be0d --- /dev/null +++ b/server/modules/sssd-freiburg/etc/pam.d/common-session @@ -0,0 +1,37 @@ +# +# /etc/pam.d/common-session - session-related modules common to all services +# +# This file is included from other service-specific PAM config files, +# and should contain a list of modules that define tasks to be performed +# at the start and end of sessions of *any* kind (both interactive and +# non-interactive). +# +# As of pam 1.0.1-6, this file is managed by pam-auth-update by default. +# To take advantage of this, it is recommended that you configure any +# local modules either before or after the default block, and use +# pam-auth-update to manage selection of other modules. See +# pam-auth-update(8) for details. + +# here are the per-package modules (the "Primary" block) +session [default=1] pam_permit.so +# here's the fallback if no module succeeds +session requisite pam_deny.so +# prime the stack with a positive return value if there isn't one already; +# this avoids us returning an error just because nothing sets a success code +# since the modules above will each just jump around +session required pam_permit.so +# The pam_umask module will set the umask according to the system default in +# /etc/login.defs and user settings, solving the problem of different +# umask settings with different shells, display managers, remote sessions etc. +# See "man pam_umask". +session optional pam_umask.so +# and here are more per-package modules (the "Additional" block) +session required pam_systemd.so +session optional pam_env.so readenv=1 +session optional pam_env.so readenv=1 envfile=/etc/default/locale +session optional pam_krb5.so minimum_uid=1000 +session [success=1] pam_unix.so +session [success=ok] pam_sss.so +session sufficient pam_script.so +session optional pam_mkhomedir.so skel=/etc/skel umask=0022 +# end of pam-auth-update config diff --git a/server/modules/sssd-freiburg/etc/sssd/sssd.conf b/server/modules/sssd-freiburg/etc/sssd/sssd.conf new file mode 100644 index 00000000..7b3d7b51 --- /dev/null +++ b/server/modules/sssd-freiburg/etc/sssd/sssd.conf @@ -0,0 +1,60 @@ +[sssd] +config_file_version = 2 +services = nss, pam +#debug_level = 0xffff +# SSSD will not start if you do not configure any domains. +# Add new domain configurations as [domain/<NAME>] sections, and +# then add the list of domains (in the order you want them to be +# queried) to the "domains" attribute below and uncomment it. +domains = LDAP + +[nss] +filter_users = root,ldap,named,avahi,haldaemon,dbus,radiusd,news,nscd,demo + +[pam] + +# Example LDAP domain +[domain/LDAP] +id_provider = ldap +auth_provider = ldap +ldap_tls_reqcert = never +# ldap_schema can be set to "rfc2307", which stores group member names in the +# "memberuid" attribute, or to "rfc2307bis", which stores group member DNs in +# the "member" attribute. If you do not know this value, ask your LDAP +# administrator. +ldap_schema = rfc2307bis +ldap_uri = ldaps://ldap.ruf.uni-freiburg.de +ldap_backup_uri = ldaps://bv1.ruf.uni-freiburg.de,ldaps://bv2.ruf.uni-freiburg.de,ldaps://bv3.ruf.uni-freiburg.de +ldap_group_search_base = ou=group,dc=uni-freiburg,dc=de +ldap_user_search_base = ou=people,dc=uni-freiburg,dc=de +ldap_user_home_directory = rufClientHome +ldap_search_base = ou=people,dc=uni-freiburg,dc=de +# Note that enabling enumeration will have a moderate performance impact. +# Consequently, the default value for enumeration is FALSE. +# Refer to the sssd.conf man page for full details. +; enumerate = false +# Allow offline logins by locally storing password hashes (default: false). +cache_credentials = true + +# An example Active Directory domain. Please note that this configuration +# works for AD 2003R2 and AD 2008, because they use pretty much RFC2307bis +# compliant attribute names. To support UNIX clients with AD 2003 or older, +# you must install Microsoft Services For Unix and map LDAP attributes onto +# msSFU30* attribute names. +;[domain/AD] +;id_provider = ldap +;auth_provider = krb5 +;chpass_provider = krb5 + +;ldap_uri = ldaps://bv1.ruf.uni-freiburg.de ldaps://bv2.ruf.uni-freiburg.de ldaps://bv3.ruf.uni-freiburg.de +;ldap_search_base = ou=people,dc=uni-freiburg,dc=de +;ldap_schema = rfc2307bis +;ldap_sasl_mech = GSSAPI +;ldap_user_object_class = user +;ldap_group_object_class = group +;ldap_user_principal = userPrincipalName +;ldap_account_expire_policy = ad +;ldap_force_upper_case_realm = true +; +; krb5_server = your.ad.example.com +; krb5_realm = EXAMPLE.COM |
