3 aklog_dynamic_auth - LAM module to obtain AFS tokens from Kerberos tickets
11 program = /usr/lib/security/aklog_dynamic_auth
19 B<aklog_dynamic_auth> is an AIX LAM (Loadable Authentication Modules)
20 module that can create new AFS sessions and acquire AFS tokens from
21 Kerberos 5 tickets. It is similar in function to the L<aklog(1)> program,
22 and various PAM modules such as L<pam_afs_session(8)>.
24 B<aklog_dynamic_auth> does not obtain any credentials on its own, nor does
25 it deal with passwords of any kind. You must have another way of obtaining
26 Kerberos 5 tickets before invoking B<aklog_dynamic_auth> in order for it
27 to do anything useful. AIX comes with a B<KRB5> LAM module that can do
32 Beyond the normal LAM options, B<aklog_dynamic_auth> understands the
39 If this is specified, B<aklog_dynamic_auth> will try to only utilize
40 UID-based PAGs. This means that when acquiring credentials,
41 B<aklog_dynamic_auth> will not try to create a new PAG, and instead will
42 set tokens for the current UID. If the current UID is root,
43 B<aklog_dynamic_auth> will look up the UID of the user we are
44 authenticating for, and will set tokens for that UID instead.
46 Specifying this option is necessary for AFS tokens to be refreshed with
47 the CDE screen locking program, and possibly other LAM users.
49 Note that if B<aklog_dynamic_auth> is run from a context that has a real
50 PAG, it is impossible for it to set the tokens for a particular UID. If
51 B<uidpag> is set and this situation is detected, B<aklog_dynamic_auth>
52 will log an error, but will attempt to continue and will just create a new
53 PAG, as if B<uidpag> were not set.
57 Normally, B<aklog_dynamic_auth> will look up the AFS ID of the username
58 for which it is acquiring credentials by looking the in AFS Protection
59 Database. Specifying the B<localuid> option instead causes
60 B<aklog_dynamic_auth> to look up the relevant user via L<getpwnam(3)>, and
61 to use the returned UID for the AFS ID.
63 This will only work correctly if the IDs of local users and their AFS IDs
64 in the AFS Protection Database are synchronized, and will only work for
65 users of the local cell.
67 Specifying B<localuid> makes B<aklog_dynamic_auth> avoid calling AFS pt
68 routines, which can crash certain long-running daemons that call into LAM.
74 The following example allows the user C<userid> to login with Kerberos 5
75 credentials and obtain AFS tokens on success. If Kerberos 5 authentication
76 fails, we fall back to using local authentication. The
77 B<aklog_dynamic_aklog> options for B<uidpag> and B<localuid>
79 In C</usr/lib/security/methods.cfg>:
82 program = /usr/lib/security/KRB5
83 program_64 = /usr/lib/security/KRB5_64
84 options = authonly,kadmind=no
87 program = /usr/lib/security/aklog_dynamic_auth
88 options = uidpag,localuid,authonly
90 In C</etc/security/user>:
93 SYSTEM = "(KRB5[SUCCESS] and K5AFS) OR compat"
101 Copyright Sine Nomine Associates 2011
103 This documentation is covered by the BSD License as written in the
104 doc/LICENSE file. This man page was written by Andrew Deason for OpenAFS.