[Date Prev][Date Next]
[Chronological]
[Thread]
[Top]
Re: Password expiration
On Tuesday, 3 April 2012 23:16:43 Collins, Cris wrote:
> The problem was resolved by adding the following per the nis schema. My
> statement below was incorrect. shadowLastChange was not updating, as
> "getent shadow username" showed me.
>
> access to attrs=shadowLastChange,shadowMax
> by dn="cn=Manager,dc=domain,dc=com" write
> by self write
> by * read
>
> Thank you for your response.
Yes, it will work, for applications that look for shadowAccount attributes.
My approach is to remove ldap from the shadow line of nsswitch.conf, configure
ppolicy on the LDAP server, and ensure PAM is setup correctly to enforce
password expiration via ppolicy.
Then, even if users never login to a shell on a server configured for LDAP,
they will be locked out of all other LDAP-using services (except for WiFi
access points via FreeRADIUS EAP PEAP with MSCHAPv2 against samba attributes,
since even if the samba attributes are updated, FreeRADIUS doesn't currently
seem to respect them).
Regards,
Buchan