User Authorization Using 'PAM Authentication Module(pam_radius_auth.so)
Alan DeKok
aland at deployingradius.com
Thu Dec 6 16:27:05 CET 2018
On Dec 5, 2018, at 2:42 AM, Deepak Kumar Bhagat <Deepak.Bhagat at radisys.com> wrote:
>
> I have a requirement to authenticate and authorize users for management access to the device using Radius Protocol.
> I'm using Linux PAM module (pam_radius_auth.so) for Radius client support and freeRADIUS as Radius server.
> I have written sample PAM-enable application (check_user) to test the same. I could successfully test user authentication using my application.
That's good.
> As part of user authorization, I'm sending 'Management-Privilege-Level (136)' RFC 5607 attribute in 'Access-Accept' and
> Intend to use the same at the device to give different management access to the user. Different Management-Privilege-Level (MPL) levels are mapped as below.
>
> MPL Access Level
> 1 Root user (read, write, exec)
> 2 Read only user (read)
> 3 Deny access (null)
>
> Is there a way to fetch/read/pass this attribute from pam_radius_auth.so to my PAM-enable application??
Not in the current module.
> I checked pam_radius_auth.so source code, It seems it doesn't read any attribute from 'Access Accept' received from the server,
> if that is the case then how can we enable 'PAM Authentication Module' to read the authorization attributes received in the response??
Source code patches.
> Or, Can someone suggest how can we achieve user authorization using PAM Authentication module??
> One relevant reference form the mail list is https://www.redhat.com/archives/pam-list/2001-March/msg00056.html, but it seems the code changes are not included in the module.
If you can update the patch for the current module, I can add it in.
Alan DeKok.
More information about the Freeradius-Users
mailing list