Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

/etc/pam.d changes breaks authselect and FreeIPA changes #836

Open
tsmalmbe opened this issue Jan 2, 2025 · 0 comments
Open

/etc/pam.d changes breaks authselect and FreeIPA changes #836

tsmalmbe opened this issue Jan 2, 2025 · 0 comments

Comments

@tsmalmbe
Copy link

tsmalmbe commented Jan 2, 2025

Description

I suggest that compatibility with authselect and FreeIPA should be maintained.

Solution

  1. Authselect.
    It is my understanding, that authselect has a core default auth file it uses, which system-auth and password-auth are linked to. In addition, any local overrides should be in the local-files, which in turn should override the core defaults. Would in not be feasible, to simply write all the hardened options into the local files, overriding (almost everything) in the core defaults? As it currently stands, the hardenings change the links from the core defaults to local links, resulting on errors when authselect apply-changes is executed.

  2. FreeIPA
    FreeIPA likes to use oddjob for automatically creating home directories. As it currently stands, the hardenings overwrite also this line in the config, resulting in a need to modify the files (with yet another ansible task) to include the line required by FreeIPA (session optional pam_oddjob_mkhomedir.so). I would suggest that this is somehow counted for, either as a var of some kind or in some other way.

Alternatives

No response

Additional information

...

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

1 participant