diff options
author | Gerald Carter <jerry@samba.org> | 2001-02-08 18:39:36 +0000 |
---|---|---|
committer | Gerald Carter <jerry@samba.org> | 2001-02-08 18:39:36 +0000 |
commit | b5eb73d9aa3e25aee0ef800961dc8345229fc779 (patch) | |
tree | b34754f01f913a2780de12c8b28e6065bfba9522 /source3 | |
parent | a44daf2961b0c5aa5bb64d42d44a49cce38a9e38 (diff) | |
download | samba-b5eb73d9aa3e25aee0ef800961dc8345229fc779.tar.gz samba-b5eb73d9aa3e25aee0ef800961dc8345229fc779.tar.bz2 samba-b5eb73d9aa3e25aee0ef800961dc8345229fc779.zip |
add pam_setcred() call to pam_auth(). Patch was submited last Oct.
jerry
(This used to be commit 57165d1578eefa270d5c0bd8697a774eb8cb06cf)
Diffstat (limited to 'source3')
-rw-r--r-- | source3/auth/pass_check.c | 8 | ||||
-rw-r--r-- | source3/passdb/pass_check.c | 8 |
2 files changed, 16 insertions, 0 deletions
diff --git a/source3/auth/pass_check.c b/source3/auth/pass_check.c index aea543d853..c803816e04 100644 --- a/source3/auth/pass_check.c +++ b/source3/auth/pass_check.c @@ -134,6 +134,14 @@ static BOOL pam_auth(char *user, char *password) * put a pam_allow.so entry in /etc/pam.conf for account handling. */ pam_error = pam_acct_mgmt(pamh, PAM_SILENT); PAM_BAIL; + + /* + * This will allow samba to aquire a kerberos token. And, when + * exporting an AFS cell, be able to /write/ to this cell. + */ + pam_error = pam_setcred(pamh, (PAM_ESTABLISH_CRED|PAM_SILENT)); + PAM_BAIL; + pam_end(pamh, PAM_SUCCESS); /* If this point is reached, the user has been authenticated. */ return (True); diff --git a/source3/passdb/pass_check.c b/source3/passdb/pass_check.c index aea543d853..c803816e04 100644 --- a/source3/passdb/pass_check.c +++ b/source3/passdb/pass_check.c @@ -134,6 +134,14 @@ static BOOL pam_auth(char *user, char *password) * put a pam_allow.so entry in /etc/pam.conf for account handling. */ pam_error = pam_acct_mgmt(pamh, PAM_SILENT); PAM_BAIL; + + /* + * This will allow samba to aquire a kerberos token. And, when + * exporting an AFS cell, be able to /write/ to this cell. + */ + pam_error = pam_setcred(pamh, (PAM_ESTABLISH_CRED|PAM_SILENT)); + PAM_BAIL; + pam_end(pamh, PAM_SUCCESS); /* If this point is reached, the user has been authenticated. */ return (True); |