Hello,
I'm looking for a little assistance getting my pam configuration right. What I am trying to do is configure account locking for local accounts after 5 invalid logins, but allow any non-local account to authenticate through kerberos. I have had both of these configurations working separately but I'm trying to merge them at this point. I've tried to do some google searching to find any similar examples, but haven't had much luck. If someone has an example or could point me to a resource that may help that would be great. Below is what I currently have for a config which is only working for the local stuff now:
Code:
#%PAM-1.0
# This file is auto-generated.
# User changes will be destroyed the next time authconfig is run.
auth required pam_faillock.so preauth silent audit deny=5 unlock_time=1800
auth sufficient pam_unix.so nullok try_first_pass
auth [default=die] pam_faillock.so authfail audit deny=5 unlock_time=1800
auth sufficient pam_krb5.so use_first_pass
auth requisite pam_succeed_if.so uid >= 500 quiet
auth required pam_deny.so
account required pam_unix.so broken_shadow
account sufficient pam_localuser.so
account sufficient pam_succeed_if.so uid < 500 quiet
account [default=bad success=ok user_unknown=ignore] pam_krb5.so
account required pam_permit.so
account required pam_faillock.so
password requisite pam_cracklib.so try_first_pass retry=3 type=
password sufficient pam_unix.so sha512 shadow nullok try_first_pass use_authtok remember=4
password sufficient pam_krb5.so use_authtok
password required pam_deny.so
session optional pam_keyinit.so revoke
session required pam_limits.so
session [success=1 default=ignore] pam_succeed_if.so service in crond quiet use_uid
session required pam_unix.so
session optional pam_krb5.so
Let me know if I can offer anymore details.
Thanks,
Chris.