--- doc/build/Attic/loncapapasswordauthentication.html 2001/09/30 18:32:10 1.4 +++ doc/build/Attic/loncapapasswordauthentication.html 2002/02/27 00:19:47 1.6 @@ -51,14 +51,17 @@ different ways passwords can be evaluate Making a LON-CAPA system work with shadow passwords (in five steps; assuming that the linux system is configured for shadow passwords)
-1. Get http://www.wwnet.net/~janc/software/mod_auth_external-2.1.13.tar.gz
-
-2. cd mod_auth_external/pwauth
-
-3. alter the config.h file line to match the UID of www
+1. Login as user=sysadm.
+2. cd ~
+3. mkdir install
+4. cd install
+5. wget http://www.wwnet.net/~janc/software/mod_auth_external-2.1.15.tar.gz
+6. tar xzvf mod_auth_external-2.1.15.tar.gz
+7. cd mod_auth_external/pwauth
+8. alter the config.h file line to match the UID of www
 #define SERVER_UIDS 500         /* user "www" */
-
-4.
+9. make
+10. sudo emacs -nw /etc/pam.d/pwauth
       If you have a /etc/pam.d directory, you need to create a file named
       "pwauth" inside it.  To authenticate out of the Unix Shadow file
       under Redhat 6.x, the /etc/pam.d/pwauth file should look something like
@@ -67,10 +70,12 @@ assuming that the linux system is config
         auth       required     /lib/security/pam_pwdb.so shadow nullok
         auth       required     /lib/security/pam_nologin.so
         account    required     /lib/security/pam_pwdb.so
-
-
-5.  place pwauth in /usr/local/sbin/.
-
+11.
+Place ~/mod_auth_external/pwauth/pwauth in /usr/local/sbin/ with
+setuid permissions.
+sudo cp /home/sysadm/install/mod_auth_external/pwauth/pwauth /usr/local/sbin/.
+sudo chmod 6755 /usr/local/sbin/pwauth
+