libnss-ldapd: Stretch Client authenticating to Openldap without hosting user password in local file
[Date Prev][Date Next] [Thread Prev][Thread Next]libnss-ldapd: Stretch Client authenticating to Openldap without hosting user password in local file
- From: Denis Folcher <denis.folcher [at] gmail.com>
- To: nss-pam-ldapd-users [at] lists.arthurdejong.org
- Subject: libnss-ldapd: Stretch Client authenticating to Openldap without hosting user password in local file
- Date: Thu, 22 Mar 2018 11:50:05 +0100
Hello,
As a proof of concept, i would like to improve the security level of Debian client machines which users are ldap users,by having the users's password not being synchronized onto the machine passwd file.
(Just to let you know the authentication with password synchronization works perfectly.)
To do so i ended up using libnss-ldapd and i tried to shut nscd and/or nslcd and also to manipulate configuration files to achieve this. - Second: if this is possible, would be so kind to gimme some clues about it ?
- Third: if this isnt possible with libnss-ldapd, with which tool do you think that may be possible and would you have some hints about this ?-- To unsubscribe send an email to nss-pam-ldapd-users-unsubscribe@lists.arthurdejong.org or see https://lists.arthurdejong.org/nss-pam-ldapd-users/
- libnss-ldapd: Stretch Client authenticating to Openldap without hosting user password in local file, Denis Folcher
- Prev by Date: Re: pam_unix succeeds unexpectedly with libnss-ldapd
- Next by Date: Re: libnss-ldapd: Stretch Client authenticating to Openldap without hosting user password in local file
- Previous by thread: Re: pam_unix succeeds unexpectedly with libnss-ldapd
- Next by thread: Re: libnss-ldapd: Stretch Client authenticating to Openldap without hosting user password in local file