yaleman on kanidm_cli_docker
bump (compare)
yaleman on kanidm_cli_docker
updated (compare)
yaleman on kanidm_cli_docker
fixing up dockerfiles (compare)
yaleman on kanidm_cli_docker
updated Added KANIDM_BUILD_PROFILE to k… (compare)
yaleman on kanidm_cli_docker
adding kanidm image and config updated removing npm deps from build an… and 5 more (compare)
github-actions[bot] on gh-pages
deploy: 4830479bd51d88ac40fb514… (compare)
github-actions[bot] on gh-pages
deploy: dd973eb0ec0fa70268806bf… (compare)
yaleman on pip
yaleman on master
Bump mkdocs-material from 8.3.8… (compare)
yaleman on cargo
yaleman on master
Bump tide-compress from 0.10.3 … (compare)
dependabot[bot] on github_actions
yaleman on master
Bump actions/setup-python from … (compare)
dependabot[bot] on github_actions
% cat /etc/kanidm/unixd
# this should be at /etc/kanidm/unixd, and configures kanidm-unixd
# some documentation is here: https://github.com/kanidm/kanidm/blob/master/kanidm_book/src/pam_and_nsswitch.md
pam_allowed_login_groups = ["humans"]
# default_shell = "/bin/bash"
home_prefix = "/home/"
home_attr = "uuid"
home_alias = "name"
uid_attr_map = "name"
gid_attr_map = "name"
$ su -l nirya
Password:
su: Authentication service cannot retrieve authentication info
systemctl edit kanidm-unix.service
[Service]
Environment="RUST_LOG=kanidm=debug"
in pam, on lines with pam_kanidm.so, add the option debug
% cat su
#%PAM-1.0
auth sufficient pam_rootok.so
# Uncomment the following line to implicitly trust users in the "wheel" group.
#auth sufficient pam_wheel.so trust use_uid
# Uncomment the following line to require a user to be in the "wheel" group.
#auth required pam_wheel.so use_uid
auth required pam_unix.so
account required pam_unix.so
session required pam_unix.so
password include system-auth
pam.d/su-l
is identical
$ sudo --user=nirya --login
We trust you have received the usual lecture from the local System
Administrator. It usually boils down to these three things:
#1) Respect the privacy of others.
#2) Think before you type.
#3) With great power comes great responsibility.
[sudo] password for safety:
acct_mgmt
args -> ["debug", "ignore_unknown_user"]
opts -> Options { debug: true, use_first_pass: false, ignore_unknown_user: true }