04.06.2013 Views

UCS 2.4 - Univention

UCS 2.4 - Univention

UCS 2.4 - Univention

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

10 Basic System Services<br />

from LDAP in <strong>UCS</strong>. This is particularly necessary for allowing programs to request users and groups<br />

via getent.<br />

It must be observed that the data structures for the shadow method are very restricted and cannot be<br />

expanded. This prevents the use of other information stored in LDAP among other things. As a result, ldap<br />

is included again to decide whether a user account is valid on a host based on further criteria. Thirdly,<br />

krb5 is also used here, which offers the possibility like ldap of deciding which criteria should be taken into<br />

account during the verification. An important difference is that the Kerberos service does not assign user<br />

names to the required POSIX information such as UID, GID, GECOS, HOME, Shell, etc. Services which<br />

require this information, must thus stringently use ldap or unix as well.<br />

Each of these three methods for account verification uses information from the LDAP directory: unix<br />

evaluates the shadow information, ldap also uses the host attribute or other filters if necessary and krb5<br />

evaluates the Samba attributes (sambaAcctFlags). The methods are thus not completely independent of<br />

each other and (mutually) influence each other.<br />

The configured PAM log-in procedures can be configured via <strong>Univention</strong> Configuration Registry. Two kinds<br />

of variables are differentiated here; services reserved for administrators are configured in the <strong>Univention</strong><br />

Configuration Registry variable auth/admin/services and services for unprivileged users are config-<br />

ured in the <strong>Univention</strong> Configuration Registry variable auth/user/services.<br />

The following authentication procedures are available as standard:<br />

226<br />

Name Description of the authenticated<br />

service<br />

ftp FTP service<br />

gdm GDM for log-ins onto KDE/X11<br />

log-in Shadow log-in<br />

other fallback for non-configured ser-<br />

vices<br />

ppp PPP processes with log-in op-<br />

tion<br />

rlogin remote log-in (rlogin) (typically<br />

obsolete)<br />

screen screen terminal tool<br />

chfn chfn tool from Shadow to<br />

change user data<br />

chsh chsh tool from Shadow to<br />

change log-in shell<br />

kde KDE applications in general<br />

kscreensaver KDE screensaver<br />

kcheckpass KDE password verification<br />

rsh remote shell (rsh) (typically ob-<br />

solete)<br />

ssh secure shell<br />

su tool for changing user identity

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!