Preparing your LDAP Directory for HP-UX Integration

35
Appendix A (Authentication Methods, a Primer)
Following this section, this document makes several references to two pluggable authentication modules:
PAM_UNIX and PAM_LDAP. This section briefly explains their function and uses. Authentication
methods on an HP-UX system can be configured using the /etc/pam.conf file.
PAM_UNIX
PAM_UNIX is the standard authentication service available on HP-UX. As mentioned above, this routine
uses the user uid name and his crypt password to authenticate the user. Here is a simplified example of
authentication using PAM_UNIX during a login:
The login process prompts the user for his user name.
Login calls the PAM_UNIX authentication routine, using the specified user name.
PAM_UNIX finds the user's passwd entry by calling getpwnam(). If the entry is not found, the
authentication fails.
If the user's password is blank then the user is authenticated, otherwise…
PAM_UNIX prompts for the user's password.
PAM_UNIX crypts the entered password and compares it with the encrypted password in the entry.
If the encrypted passwords match, the authentication succeeds.
PAM_UNIX also supports additional features such as password expiration. And with the HP-UX "Trusted
Mode" product, PAM_UNIX is enhanced to support additional security features including stronger password
policies and password hiding.
PAM_LDAP
PAM_LDAP is a new authentication service introduced with the LDAP-UX Client Services product. This
authentication module uses the LDAP directory (instead of the standard authentication routines) to
authenticate users. Here is a simplified example of authentication using PAM_LDAP during a login:
The login process prompts the user for his user name.
PAM_LDAP generates an LDAP search request to find the user's entry in the directory. If the
entry is not found the authentication fails.
PAM_LDAP prompts the user for his password.
PAM_LDAP binds to the LDAP directory, using the distinguished name found in step 2 and the
password found in step 3.
PAM_LDAP returns success or failure, depending on the success of the LDAP bind request.
PAM_LDAP leaves password policy management (expiration, strength, etc.) up to the directory server.
Because PAM_LDAP does not need to examine the encrypted password, passwords may be hidden from
view, similar to the features of HP-UX "Trusted mode."