在 Kerberized Linux box 上添加本地用户/密码

Bri*_*ian 8 linux kerberos pam

现在,如果我尝试添加不在大学 Kerberos 领域中的非系统用户,无论如何都会提示我输入 Kerberos 密码。显然没有密码需要输入,所以我直接回车看看:

passwd: Authentication token manipulation error
passwd: password unchanged
Run Code Online (Sandbox Code Playgroud)

键入passwd newuser具有相同消息的相同问题。

我尝试使用pwconv,希望只需要一个影子条目,但它没有任何改变。

我希望能够添加一个不在域中的本地用户并为他们提供本地密码,而不必担心 Kerberos。

我在 Ubuntu 10.04 上。这是我的/etc/pam.d/common-*文件(Ubuntupam-auth-update软件包生成的默认值):

/etc/pam.d/common-account

# here are the per-package modules (the "Primary" block)
account [success=1 new_authtok_reqd=done default=ignore]        pam_unix.so
# here's the fallback if no module succeeds
account requisite                       pam_deny.so
# prime the stack with a positive return value if there isn't one already;
# this avoids us returning an error just because nothing sets a success code
# since the modules above will each just jump around
account required                        pam_permit.so
# and here are more per-package modules (the "Additional" block)
account required                        pam_krb5.so minimum_uid=1000
# end of pam-auth-update config
Run Code Online (Sandbox Code Playgroud)

/etc/pam.d/common-auth

# here are the per-package modules (the "Primary" block)
auth    [success=2 default=ignore]      pam_krb5.so minimum_uid=1000
auth    [success=1 default=ignore]      pam_unix.so nullok_secure try_first_pass
# here's the fallback if no module succeeds
auth    requisite                       pam_deny.so
# prime the stack with a positive return value if there isn't one already;
# this avoids us returning an error just because nothing sets a success code
# since the modules above will each just jump around
auth    required                        pam_permit.so
# and here are more per-package modules (the "Additional" block)
# end of pam-auth-update config
Run Code Online (Sandbox Code Playgroud)

/etc/pam.d/common-password

# here are the per-package modules (the "Primary" block)
password        requisite                       pam_krb5.so minimum_uid=1000
password        [success=1 default=ignore]      pam_unix.so obscure use_authtok     try_first_pass sha512
# here's the fallback if no module succeeds
password        requisite                       pam_deny.so
# prime the stack with a positive return value if there isn't one already;
# this avoids us returning an error just because nothing sets a success code
# since the modules above will each just jump around
password        required                        pam_permit.so
# and here are more per-package modules (the "Additional" block)
# end of pam-auth-update config
Run Code Online (Sandbox Code Playgroud)

/etc/pam.d/common-session

# here are the per-package modules (the "Primary" block)
session [default=1]                     pam_permit.so
# here's the fallback if no module succeeds
session requisite                       pam_deny.so
# prime the stack with a positive return value if there isn't one already;
# this avoids us returning an error just because nothing sets a success code
# since the modules above will each just jump around
session required                        pam_permit.so
# and here are more per-package modules (the "Additional" block)
session optional                        pam_krb5.so minimum_uid=1000
session required        pam_unix.so
# end of pam-auth-update config
Run Code Online (Sandbox Code Playgroud)

小智 10

通过 pam-auth-update 命令临时调整

  1. 您可以使用pam-auth-update. 所以它看起来像这样:
    [ ] Kerberos authentication
  2. 然后您可以添加用户/更改密码。
  3. 然后pam-auth-update在完成后重新激活 Kerberos 。所以它看起来像这样:
    [*] Kerberos authentication

另请参阅:pam-auth-update联机帮助页