让Sendmail和Dovecot使用AD进行用户认证
2010-02-12 00:59
716 查看
如果AD认证不通过则使用linux系统认证。
/etc/ldap.conf:
host 192.168.1.1
base dc=mycompany,dc=local
binddn ldap@mycompany.local
bindpw Thisisaveryhardpassword
ldap_version 3
port 389
pam_filter objectclass=User
pam_login_attribute sAMAccountName
pam_password ad
ssl no
/etc/pam.d/dovecot:
#%PAM-1.0
auth required pam_nologin.so
auth sufficient pam_ldap.so
auth required pam_stack.so service=system-auth
account sufficient pam_ldap.so
account required pam_stack.so service=system-auth
session required pam_stack.so service=system-auth
/etc/pam.d/smtp:
#%PAM-1.0
auth sufficient pam_ldap.so
auth required pam_stack.so service=system-auth
account sufficient pam_ldap.so
account required pam_stack.so service=system-auth
/etc/sysconfig/saslauthd:
# Directory in which to place saslauthd's listening socket, pid file, and so
# on. This directory must already exist.
SOCKETDIR=/var/run/saslauthd
# Mechanism to use when checking passwords. Run "saslauthd -v" to get a list
# of which mechanism your installation was compiled to use.
#MECH=shadow
MECH=pam
# Additional flags to pass to saslauthd on the command line. See saslauthd(8)
# for the list of accepted flags.
FLAGS=
参考:
http://www.redhat.com/docs/manuals/linux/RHL-8.0-Manual/ref-guide/s1-pam-modules.html
/etc/ldap.conf:
host 192.168.1.1
base dc=mycompany,dc=local
binddn ldap@mycompany.local
bindpw Thisisaveryhardpassword
ldap_version 3
port 389
pam_filter objectclass=User
pam_login_attribute sAMAccountName
pam_password ad
ssl no
/etc/pam.d/dovecot:
#%PAM-1.0
auth required pam_nologin.so
auth sufficient pam_ldap.so
auth required pam_stack.so service=system-auth
account sufficient pam_ldap.so
account required pam_stack.so service=system-auth
session required pam_stack.so service=system-auth
/etc/pam.d/smtp:
#%PAM-1.0
auth sufficient pam_ldap.so
auth required pam_stack.so service=system-auth
account sufficient pam_ldap.so
account required pam_stack.so service=system-auth
/etc/sysconfig/saslauthd:
# Directory in which to place saslauthd's listening socket, pid file, and so
# on. This directory must already exist.
SOCKETDIR=/var/run/saslauthd
# Mechanism to use when checking passwords. Run "saslauthd -v" to get a list
# of which mechanism your installation was compiled to use.
#MECH=shadow
MECH=pam
# Additional flags to pass to saslauthd on the command line. See saslauthd(8)
# for the list of accepted flags.
FLAGS=
参考:
http://www.redhat.com/docs/manuals/linux/RHL-8.0-Manual/ref-guide/s1-pam-modules.html
相关文章推荐
- 配置Dotnetnuke使用AD用户认证
- Spring Security笔记:使用数据库进行用户认证(form login using database)
- Spring Security进阶身份认证之使用数据库中的用户进行身份认证(附源码)
- JAVA中使用jcifs集成AD域用户认证
- 使用shiro框架进行用户登录认证报错(HTTP Status 500 - Authentication failed for token submission )解决
- 第6章-在Node.js应用中使用session和OAuth进行用户认证和授权
- Spring Security笔记:使用数据库进行用户认证(form login using database) - 菩提树下的杨过 - 博客园
- Spring Security 使用数据库用户进行认证
- 使用Zend_Auth和Zend_Acl进行登录认证及根据用户角色进行权限控制
- django “如何”系列1:如何使用REMOTE_USER(远程用户)进行认证
- VSftpd使用MySQL存储虚拟用户进行认证 推荐
- Netscreen防火墙使用AD进行用户验证
- Spring Security笔记:使用数据库进行用户认证(form login using database)
- 使用Java Mail Authenticator子类进行用户认证来发送电子邮件示例
- Node.js项目实战-构建可扩展的Web应用(第一版): 6 在Node.js应用中使用session和OAuth进行用户认证和授权
- 使用PHP进行用户身份认证
- JAVA中使用LDAP进行用户认证
- JAVA中使用LDAP进行用户认证
- 在Tomcat 5.5 中使用 LDAP 进行用户认证