There are a few bug fixes, major code enhancements, and added functionality to this release.
Modified local password account creation function to utilize libc pwd.h, shadow.h & grp.h libraries.
Added majority to items to internal pam_krb5 functions in regards to krb5.conf option configurations as well as data and structs that were not previously freed of memory resources.
Also added functionality to dynamically add authenticated user to list of groups, helping to provide desktop functionality for usb, audio, cd-rom resources.
Well I have put together a real simple howto document for this project.
https://sourceforge.net/apps/mediawiki/pam-krb5-ldap/index.php?title=Main_Page
I have also submitted a patch to the original pam_krb5 developer over at Red hat so I can officially discontinue this project.
I could really use some feedback on this patch, fork as it was designed to eliminate the multiple configuration files needed for an authentication scheme such as this.
Well the latest release of the pam_krb5+ldap module is finally deemed stable enough for a project page at source forge. This is something I needed to create but it should help others out as well.
This PAM module contains the latest patches for the original pam_krb5 plus additional support for enumerating user accounts from an Active Directory / LDAP directory prior to the TGT verification.
By performing this look up (no authentication against the LDAP / AD directory) you gain the user login, uid, gid, home directory, and default shell information required by Kerberos authentication while keeping the need for multiple services such as NIS, Samba etc. to a minimum.... read more
Well the latest release of the pam_krb5+ldap module is finally deemed stable enough for a project page at source forge. This is something I needed to create but it should help others out as well.
This PAM module contains the latest patches for the original pam_krb5 plus additional support for enumerating user accounts from an Active Directory / LDAP directory prior to the TGT verification.
By performing this lookup (no authentication against the LDAP / AD directory) you gain the user login, uid, gid, home directory, and default shell information required by Kerberos authentication while keeping the need for multiple services such as NIS, Samba etc. to a minimum. Much needed help on centralized administration of user accounts.