LDAP-UX Client Services B.04.00 with Microsoft Windows 2000/2003 Active Directory Administrator's Guide

Sample /etc/pam.conf File for HP-UX 11i v1 Trusted Mode
Appendix F186
coexistence of LDAP-UX and Trusted Mode. If your directory server is
the Microsoft Windows 2000 Active Directory Server and your LDAP
client is in the Trusted Mode, the /etc/pam.conf file must be
configured as shown in the following example file.
Use the following steps to create the /etc/pam.conf example file on the
HP-UX 11i v1 system:
Step 1. copy the /etc/pam.krb5 file to the /etc/pam.conf file.
Step 2. Edit the /etc/pam.conf file and change the control flag for the
/usr/lib/security/libpam_krb5.1 entries to “required” under the
Account management and Session management sessions.
Step 3. Add the try_first_pass option to the
/usr/lib/security/libpam_unix.1 entry under the Password
management to avoid prompting old password twice when a local user
changes his password or when a local user logs in with an expired
password.
#
# PAM configuration
#
# This pam.conf file is intended as an example only.
# see pam.conf(4) for more details
#
################################################################
# This sample file will authenticate the user who belongs to #
# either Kerberos or Unix system. Using this configuration file#
# if the user is authenticated through Kerberos then the Unix #
# authentication will not be invoked. However,if the Kerberos #
# authentication fails for the user, then the fallback #
# authentication mechanism PAM-Unix will be invoked to #
# authenticate the user.The assumption is the user is either #
# present in Kerberos or in Unix system. #
# #
# In case, the administrator wants the password for all the #
# users to be synchronous between Kerberos and Unix systems, #
# then the control flag should be set to "required" for all #
# the entries with user_first_pass option set for pam_unix. #
# If password synchronization is optional then try_first_pass #
# option need to be set for pam_unix, so that the user can #
# login using the appropriate passwords. #
################################################################
#
# Authentication management
#
login auth sufficient /usr/lib/security/libpam_krb5.1
login auth required /usr/lib/security/libpam_unix.1 try_first_pass
su auth sufficient /usr/lib/security/libpam_krb5.1
su auth required /usr/lib/security/libpam_unix.1 try_first_pass
dtlogin auth sufficient /usr/lib/security/libpam_krb5.1
dtlogin auth required /usr/lib/security/libpam_unix.1 try_first_pass
dtaction auth sufficient /usr/lib/security/libpam_krb5.1