Crates.io | pam_groupmap |
lib.rs | pam_groupmap |
version | 0.1.3 |
source | src |
created_at | 2017-06-29 15:28:59.23851 |
updated_at | 2017-07-21 09:24:30.922198 |
description | PAM Service module allowing to map users based on LDAP group membership |
homepage | https://github.com/ndenev/pam_groupmap |
repository | https://github.com/ndenev/pam_groupmap |
max_upload_size | |
id | 21219 |
size | 17,867 |
*** WORK IN PROGRESS ***
This PAM service module can be used to map given user to another based on LDAP group membership. It can work only if used as PAM accounting module.
Compile and install the .so
:
cargo build --release
sudo cp target/release/libpam_groupmap.so /lib/security/pam_groupmap.so
Create the config file /etc/pam_groupmap.toml
:
# LDAP connection parameters
[ldap]
# Comma separated list of LDAP servers.
uri = "ldaps://ldap1.example.com:636,ldaps://ldap2.example.com:636"
# LDAP simple bind credentials (at the moment they are the same for all servers)
user = "XXX"
pass = "YYY"
#
# LDAP server connection timeout in seconds, default is 2.
# conn_timeout = 2
# LDAP server opeartion timeout in seconds (bind and search), default is 5.
# op_timeout = 5
#
# pam_groupmap will do an LDAP subtree search for the
# attribute $group_attribute under $user_base_dn with
# filter ($uid_attribute=$pam_username)
# Then the results are going to be filtered locally for
# only those that end with $group_base_dn
user_base_dn = "OU=people,OU=user,DC=example,DC=com"
group_base_dn = "OU=db,OU=groups,DC=example,DC=com"
uid_attribute = "sAMAccountName"
group_attribute = "memberOf"
# LDAP Group to User mappings
[mappings]
"dbadmin" = "dbadmin"
"dbreadonly" = "dbrouser"
"dbreadwrite" = "rbrwuser"
Make sure the config has the correct permissions:
chown root:mysql /etc/pam_groupmap.toml
chmod 640 /etc/pam_groupmap.toml
Setup PAM, for example for Percona XtraDB in /etc/pam.d/mysqld
:
auth requisite pam_unix.so
account requisite pam_groupmap.so /etc/pam_groupmap.toml