[tac_plus] tac_plus with pam-ldap to AD implementation

Aaron Wasserott aaron.wasserott at viawest.com
Mon Mar 17 19:25:29 UTC 2014


Here are the 3 PAM/LDAP files we have running if they help. I am not sure how the 3rd one is getting linked into the mix, but to get LDAPS working we had to put it in place. This is on a CentOS 6.5 box, and users authenticate against ActiveDirectory.

### /etc/pam.d/tac_plus
#%PAM-1.0
auth        sufficient    /lib/security/$ISA/pam_unix.so likeauth nullok
auth        sufficient    /lib/security/$ISA/pam_ldap.so config=/etc/ldap_tacacs.conf use_first_pass
auth        required      /lib/security/$ISA/pam_deny.so
account     [default=bad success=ok user_unknown=ignore] /lib/security/$ISA/pam_ldap.so
account     required      /lib/security/$ISA/pam_permit.so


### /etc/ldap_tacacs.conf
URI ldaps:// [ server name ]

base OU=[ OU name ],dc=[ domain name ],dc=[ domain name suffix ]
binddn [ binding DN ]
bindpw [ binding password ]

pam_login_attribute sAMAccountName
ssl yes
timelimit 120
bind_timelimit 120
idle_timelimit 3600
tls_cacert /etc/openldap/certs/[ cert file ]
TLS_REQCERT never


### /etc/openldap/ldap.conf
URI ldaps:// [ server name ]

base OU=[ OU name ],dc=[ domain name ],dc=[ domain name suffix ]
binddn [ binding DN ]
bindpw [ binding password ]

pam_login_attribute sAMAccountName
ssl yes
timelimit 120
bind_timelimit 120
idle_timelimit 3600
tls_cacert /etc/openldap/certs/[ cert file ]


-----Original Message-----
From: tac_plus-bounces at shrubbery.net [mailto:tac_plus-bounces at shrubbery.net] On Behalf Of Linda Slater
Sent: Monday, March 17, 2014 12:59 PM
To: tac_plus at shrubbery.net
Subject: [tac_plus] tac_plus with pam-ldap to AD implementation

Hi 

I have read and tried many of the information listed in the many postings but I am still having an issue. 

I am running on ubuntu 12.04lts.   I want my users to log into the Cisco 
router devices using their AD credentials  The server that TACplus is running on has been joined to the AD test domain.  I have also confirmed 
that I can bind to the remote LDAP server.    Note I have also tested this 
with krb5 _kerboros) and that also works.

My tacacs.conf file for my tacplus user pointing to PAM  login = PAM. When my test user tries to login to the Cisco router , the username and password that is accepted happens to be the username and password that is in the /etc/passwd file on the ubuntu server rather than the AD username 
and password?   How do I get PAM to communicate with the remote LDAP 
server?    Note I have configured my ldap files per the posting by Adam.

I get the following error message 

pam_ldap: reconnecting to LDAP server...
 pam_ldap: reconnecting to LDAP server (sleeping 1 seconds)...

note: AD and LDAP server are functioning and respond when I use the ldapsearch command. kerberos , kinit,klist ,etc.

Regards
Lin


More information about the tac_plus mailing list