--- doc/build/Attic/loncapapasswordauthentication.html 2001/02/15 15:58:38 1.3 +++ doc/build/Attic/loncapapasswordauthentication.html 2001/09/30 18:33:08 1.5 @@ -1,26 +1,30 @@ - -
-+ +
+Scott Harrison -
--Last updated: 02/15/2001 -
-+
++Last updated: 09/30/2001 +
+This file describes issues associated with authenticating passwords on a LON-CAPA system. -
-+
++I am just now adding information on how to configure a LON-CAPA +system to work with shadow passwords. +
+The following section of perl code illustrates the different ways passwords can be evaluated. -
--
+ ++ ++
my ($howpwd,$contentpwd)=split(/:/,$realpasswd); my $pwdcorrect=0; if ($howpwd eq 'internal') { @@ -41,8 +45,32 @@ different ways passwords can be evaluate } else { print $client "non_authorized\n"; } -- - - +
+1. Get http://www.wwnet.net/~janc/software/mod_auth_external-2.1.13.tar.gz + +2. cd mod_auth_external/pwauth + +3. alter the config.h file line to match the UID of www +#define SERVER_UIDS 500 /* user "www" */ + +4. + If you have a /etc/pam.d directory, you need to create a file named + "pwauth" inside it. To authenticate out of the Unix Shadow file + under Redhat 6.x, the /etc/pam.d/pwauth file should look something like + this: + + auth required /lib/security/pam_pwdb.so shadow nullok + auth required /lib/security/pam_nologin.so + account required /lib/security/pam_pwdb.so + + +5. place pwauth in /usr/local/sbin/. (chmod 6755 /usr/local/sbin/pwauth) + + +