LDAP-UX Client Services B.04.00 with Microsoft Windows 2000/2003 Active Directory Administrator's Guide
Sample /etc/pam.conf File for HP-UX 11i v2 Trusted Mode
Appendix G190
coexistence of LDAP-UX and Trusted Mode. If your directory server is
the Microsoft Windows 2000 or 2003 Active Directory Server and your
LDAP client is in the Trusted Mode, the /etc/pam.conf file must be
configured as shown in the following example file.
Use the following steps to create the /etc/pam.conf example file on the
HP-UX 11i v2 system:
Step 1. copy the /etc/pam.krb5 file to the /etc/pam.conf file.
Step 2. Edit the /etc/pam.conf file and change the control flag for the
libpam_krb5.so.1 entries to “required” under the Session
management session.
Step 3. Add the try_first_pass option to the libpam_unix.so.1 entry under
the Password management to avoid prompting “old password” twice
when a local user changes his password or when a local user logs in with
an expired password.
#
# PAM configuration
#
# This pam.conf file is intended as an example only.
# see pam.conf(4) for more details
#
################################################################
# This sample file will authenticate the user who belongs to #
# either Kerberos or Unix system. Using this configuration file#
# if the user is authenticated through Kerberos then the Unix #
# authentication will not be invoked. However,if the Kerberos #
# authentication fails for the user, then the fallback #
# authentication mechanism PAM-Unix will be invoked to #
# authenticate the user.The assumption is the user is either #
# present in Kerberos or in Unix system. #
# #
# In case, the administrator wants the password for all the #
# users to be synchronous between Kerberos and Unix systems, #
# then the control flag should be set to "required" for all #
# the entries with user_first_pass option set for pam_unix. #
# If password synchronization is optional then try_first_pass #
# option need to be set for pam_unix, so that the user can #
# login using the appropriate passwords. #
# #
# The module pam_hpsec(5) is stacked as mandatory module above #
# all the modules for making security checks before #
# authentication. #
################################################################
#
# Authentication management
#
login auth required libpam_hpsec.so.1
login auth sufficient libpam_krb5.so.1
login auth required libpam_unix.so.1 try_first_pass
su auth required libpam_hpsec.so.1
su auth sufficient libpam_krb5.so.1