Configuring Linux PAM authentication
About this task
PAM-based authentication provides the flexibility to authenticate administrators using existing authentication servers, such as your organization’s Lightweight Directory Access Protocol (LDAP) directory. When PAM authentication is active, ASE logs the identity of the user executing each CLI command. This provides a user-specific audit trail of administrative access to the ASE system.
Steps
-
To activate PAM-based authentication, configure
auth_method
inase.conf
aspam::<service>,
where<service>
is the script that the PAM module reads to authenticate the users.Service scripts include
login, su, ldap,
etc. For example, thelogin
script allows all system users administrative access to ASE. -
To support PAM authentication with the
login
script, update theauth_method
configuration values inase.conf
:auth_method=pam::login
Example:
The following is an example using the CLI to change from Native to PAM authentication with
login
script:/opt/pingidentity/ase/bin/cli.sh update_auth_method pam::login -u admin -p <password>
Make sure that the script name provided for PAM-based authentication is the correct one. If a wrong file name is provided, ASE administrators are locked out of ASE.
-
To write your own PAM module script, add a custom script, such as
ldap
, that defines PAM’s behavior for user authentication to the/etc/pam.d
directory. -
To set the authentication method and use the
ldap
script, run the following command:/opt/pingidentity/ase/bin/cli.sh update_auth_method pam::ldap -u admin -p <password>
Example:
In the following example, the PAM module uses the organization’s LDAP server to authenticate users.
root@localhost:/# cat /etc/pam.d/ldap auth sufficient pam_ldap.so # Authenticate with LDAP server. #auth sufficient pam_permit.so # Allow everyone. Pass-through mode. #auth sufficient pam_deny.so # Disallow everyone. Block all access.