Authentication With PAM
Uyuni supports network-based authentication systems using pluggable authentication modules (PAM). PAM is a suite of libraries that allows you to integrate Uyuni with a centralized authentication mechanism, eliminating the need to remember multiple passwords. Uyuni supports LDAP, Kerberos, and other network-based authentication systems using PAM.
Create a PAM service file at
/etc/pam.d/susemanager. A standard
/etc/pam.d/susemanagerfile should look like this. It configures Uyuni to use the system wide PAM configuration:
#%PAM-1.0 auth include common-auth account include common-account password include common-password session include common-session
Enforce the use of the service file by adding this line to
pam_auth_service = susemanager
In this example, the PAM service file is called
Restart the Uyuni services after a configuration change.
In the Uyuni Web UI, navigate toand enable a new or existing user to authenticate with PAM.
Pluggable Authentication Modules (PAM)checkbox. It is below the password and password confirmation fields.
Changing the password in the Uyuni Web UI changes only the local password on the Uyuni Server. If PAM is enabled for that user, the local password might not be used at all. In the above example, for instance, the Kerberos password will not be changed. Use the password change mechanism of your network service to change the password for these users.
To configure system-wide authentication you can use YaST.
You will need to install the
For more information about configuring PAM, the SUSE Linux Enterprise Server Security Guide contains a generic example that will also work for other network-based authentication methods. It also describes how to configure an active directory service. For more information, see https://documentation.suse.com/sles/15-SP1/html/SLES-all/part-auth.html.