Skip to content

Commit fdbbb23

Browse files
Rui Miguel Silva Seabraabbra
authored andcommitted
Improve example
1 parent 0d84efa commit fdbbb23

File tree

1 file changed

+9
-3
lines changed

1 file changed

+9
-3
lines changed

src/page/ConfiguringAixClients.rst

Lines changed: 9 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -253,16 +253,22 @@ After installation, place a :file:`/etc/ipahbac.conf` file with the pam module's
253253

254254
::
255255

256-
-u uid=aix.bind.account,cn=users,cn=accounts,dc=example,dc=com
256+
-k /etc/security/ldap/ldap.kdb
257+
-U bind.aix.user
257258
-b dc=example,dc=com
258259
-P /etc/ldap.secret
259-
-l ldaps://ipaserver1.example.com/,ldaps://ipaserver2.example.com/
260+
-l ipaserver1.example.com,ipaserver2.example.com
261+
-D example.com
260262

261263
And add the following to :file:`/etc/pam.cfg`:
262264

263265
::
264266

265-
sshd account required pam_ipahbac.so /etc/ipahbac.conf
267+
(...)
268+
sshd account requisite pam_ipahbac.so /etc/ipahbac.conf
269+
(...)
270+
ipahbac_test account requisite pam_ipahbac.so /etc/ipahbac.conf
271+
266272

267273

268274
**Alternatively**, if you don't mind using a limited version of HBAC support, you can change your *userbasedn* field in **ldap.cfg** to check the user properties for being a member of a particular HBAC rule:

0 commit comments

Comments
 (0)