RSA Authentication Agent 7.1 For PAM-Installation and Configuration Guide For RHEL
RSA Authentication Agent 7.1 For PAM-Installation and Configuration Guide For RHEL
Agent Workflow
A machine protected by the PAM agent can be accessed either locally or remotely.
Acce s
s e s re
mo te
ly with SSH
FTP
Machine 4 cl ie n Telnet dtlogin
t
FTP Su Accesses
t rlogin Sudo locally
lie n
T e ln et C with
it h
m o te ly w n t dtlogin
s re Cl
ie
e sse client
A cc SSH Machine 1 protected by Authentication Manager
it h the PAM Agent
yw
o te l
Machine 3 em
sr
sse
ce
Ac
Machine 2
1
RSA Authentication Agent 7.1 for PAM—Installation and Configuration Guide for RHEL
2
RSA Authentication Agent 7.1 for PAM—Installation and Configuration Guide for RHEL
System Requirements
This section describes the minimum software requirements for installing the agent.
Requirement Support
Tools • telnet
• login
• rlogin
• su
• ssh (ssh, sftp and scp)
• sudo
• ftp (limited to a single transaction)
• gdm
Prerequisites
You must ensure that you have the following, to be able to install the agent.
You have the latest version of the sdconf.rec file from RSA
Authentication Manager stored in an accessible directory, such as
/var/ace, on the agent host.
3
RSA Authentication Agent 7.1 for PAM—Installation and Configuration Guide for RHEL
You have created an agent host record for the PAM agent in the
Authentication Manager database. For more information, see the
RSA Authentication Manager documentation.
If you are using OpenSSH, you must have the additional software
required for compiling source code. This software is available at
www.OpenSSH.org. This web site contains important information
about using open source software, such as the required compiling
tools and other prerequisites.
Note: Use only uppercase letters, and do not include any spaces.
4
RSA Authentication Agent 7.1 for PAM—Installation and Configuration Guide for RHEL
Configure SSH
The PAM agent is compatible with OpenSSH. To display passcode authentication
messages to users, the sshd_config file must be edited. To do this, you must have
successfully downloaded and installed the OpenSSH software, and configured the
PAM modules to work with OpenSSH. Refer to the OpenSSH documentation for any
installation information.
Note: After installation, check that VAR_ACE in the /etc/sd_pam.conf file points to
the correct location of the sdconf.rec file. This is the path to the configuration files.
The whole path must have -rw------- root permission.
5
RSA Authentication Agent 7.1 for PAM—Installation and Configuration Guide for RHEL
Important: Make sure that the RSA SecurID protected tools are using the standard
PAM modules and not the RSA PAM module. Any active sessions using the RSA
PAM modules must be closed before you proceed with the upgrade to ensure that the
upgrade is successful.
Note: This step is only required for upgrading from version 6.0 to 7.1.
Configuring Tools
This section describes how to configure supported tools to work with the PAM agent.
• Configure su
• Configure telnet
• Configure login
• Configure ssh and Related Tools
• Configure rlogin
• Configure ftp
6
RSA Authentication Agent 7.1 for PAM—Installation and Configuration Guide for RHEL
• Configure sudo
• Configure gdm
Configure su
To configure su to work with the PAM agent:
1. Change to /etc/pam.d directory.
2. Open the su file.
3. Comment any lines with "auth."
4. Add the line:
auth required pam_securid.so
Configure telnet
To configure telnet to work with the PAM agent:
Configure login
To configure login to work with the PAM agent:
1. Change to the /etc/pam.d directory.
2. Open the login file.
3. Comment lines containing "auth."
4. Add the line:
auth required pam_securid.so
7
RSA Authentication Agent 7.1 for PAM—Installation and Configuration Guide for RHEL
Configure rlogin
To configure rlogin to work with the PAM agent:
1. Change to the /etc/pam.d directory.
2. Open the rlogin file.
3. Comment lines containing "auth."
4. Add the line:
auth required pam_securid.so
Configure ftp
To configure ftp to work with the PAM agent:
1. Change to the /etc/pam.d directory.
2. Open the vsftpd file.
3. Comment lines containing "auth."
4. Add the line:
auth required pam_securid.so
Configure sudo
To configure sudo to work with the PAM agent:
1. Change to the /etc/pam.d directory.
2. Open the sudo file.
3. Comment all the lines in the authentication section.
4. Add the line:
auth required pam_securid.so
Configure gdm
To configure gdm to work with the PAM agent:
1. Change to the /etc/pam.d directory.
2. Modify the gdm, gdm-password and gdm-autologin files as follows:
a. Open each gdm file.
b. Comment all the lines in the authentication section.
c. Add the line:
auth required pam_securid.so
8
RSA Authentication Agent 7.1 for PAM—Installation and Configuration Guide for RHEL
Value Description
0 Disables logging
9
RSA Authentication Agent 7.1 for PAM—Installation and Configuration Guide for RHEL
Value Description
Note: For combinations, add the corresponding values. For example, to log
regular messages and function entry points, set the value to 3.
• RSATRACEDEST=<filepath>
Specify the file path where the logs must be redirected. By default this is blank. If
you do not set this variable in /etc/sd_pam.conf, the logs go to standard error for
authentication utilities acetest and acestatus, and no logs are generated for
authentication tools, even if the RSATRACELEVEL value has been specified.
Important: When users excluded from SecurID authentication make failed login
attempts to access the RSA PAM module, the exponential backoff feature ensures that
RSA PAM module retains control until login is successful or the authentication
session ends. For more information on configuring exponential backoff time, refer to
Configure Exponential Backoff Time.
The following section describes how to configure a connection tool (login tool) in a
stacked environment on RHEL 4.8.
10
RSA Authentication Agent 7.1 for PAM—Installation and Configuration Guide for RHEL
11
RSA Authentication Agent 7.1 for PAM—Installation and Configuration Guide for RHEL
Note: When selective group support and selective user support are both
enabled, selective user support is considered.
The following table lists the possible values which can be set in the sd_pam.conf file.
ENABLE_GROUPS ENABLE_USERS
Result
_SUPPORT _SUPPORT
Note: Do not specify Authentication Manager groups. This feature is for UNIX
groups only.
12
RSA Authentication Agent 7.1 for PAM—Installation and Configuration Guide for RHEL
13
RSA Authentication Agent 7.1 for PAM—Installation and Configuration Guide for RHEL
N Authentication behavior
Important: If the
BACKOFF_TIME_FOR_RSA_EXCLUDED_UNIX_USERS parameter is
set to 0, there will be no authentication delay for login attempts that follow a
failed login attempt. If you are using an older version of the PAM Agent
configuration file in which the
BACKOFF_TIME_FOR_RSA_EXCLUDED_UNIX_USERS parameter is
not present then PAM Agent 7.1 will set
BACKOFF_TIME_FOR_RSA_EXCLUDED_UNIX_USERS=4.
14
RSA Authentication Agent 7.1 for PAM—Installation and Configuration Guide for RHEL
gdm PAM agent messages may get truncated. The gdm theme
can be configured appropriately to avoid this issue.
Important: Make sure that the RSA SecurID protected tools are using the
standard PAM modules and not the RSA PAM module. Any active sessions
using the RSA PAM modules must be closed before you proceed with
uninstallation to ensure that the uninstall is successful.
15
RSA Authentication Agent 7.1 for PAM—Installation and Configuration Guide for RHEL
Next Step
Verify that the installation directory has been removed. If the directory still exists, you
must remove it manually.
Troubleshooting
This section describes how to troubleshoot using the various utilities of the PAM
agent.
Authentication Utilities
The authentication utilities are located in the following directories:
• 32-bit operating system: <pam agent home>/bin/32bit
• 64-bit operating system: <pam agent home>/bin/64bit
Use these utilities to:
• Perform a test authentication. For more information, see “acetest.”
• Verify communication between the PAM agent and the Authentication Manager.
For more information, see “acestatus.”
You can enable logging for these utilities. For more information, see “Enable SecurID
Trace Logging” on page 9.
acetest
This utility checks that the agent is functioning properly, by performing a test
authentication.
16
RSA Authentication Agent 7.1 for PAM—Installation and Configuration Guide for RHEL
If you are repeatedly denied access, test the Authentication Manager status. For more
information, see “acestatus” on page 17, or contact your Authentication Manager
administrator.
acestatus
This utility checks the status of each Authentication Manager on which the PAM agent
is registered as an agent host.
Note: If you have questions concerning any of the following information, contact your
Authentication Manager administrator.
The following table lists the information displayed in the Authentication Manager
section.
Configuration Version The version of the sdconf.rec file that is in use. For
Authentication Manager 5.1 or later, this number is
14.
Client Timeout The amount of time (in seconds) that the PAM agent
waits before resending authentication data to
Authentication Manager.
17
RSA Authentication Agent 7.1 for PAM—Installation and Configuration Guide for RHEL
The following table lists the status information displayed in the Authentication
Manager section.
Server Active Address The IP address that the PAM agent uses to
communicate with the server. This address could be
the actual IP address of the server you have selected,
or it could be an alias IP address assigned to the
server. An IP address of 0.0.0.0 indicates that the
agent has not yet received communication from the
server.
The following table lists the server status information displayed in the Authentication
Manager section.
For Failover only The server is reserved for failover use only.
Default Server During Only this server is available to handle requests at this
initial requests time.
Conversion Utility
The conversion utility is used when:
• Upgrading to the 7.1 agent.
• The PAM agent co-exists with other SecurID agents.
ns_conv_util
The conversion utility ns_conv_util is located in the following directories:
• 32-bit operating system: <pam agent home>/bin/32bit
• 64-bit operating system: <pam agent home>/bin/32bit and <pam agent
home>/bin/64bit
18
RSA Authentication Agent 7.1 for PAM—Installation and Configuration Guide for RHEL
<New_Securid_dir_path>
where:
• Existing_Securid_file_path is the path where the SecurID file exists.
• New_Securid_dir_path is the directory where the newly generated SecurID
file should be stored.
For example:
./ns_conv_util /var/ace/securid /var/ace_pam/
If the new destination location is not the same as the location pointed out by
VAR_ACE, you must copy the new securid file to this location.
Message Description
19
RSA Authentication Agent 7.1 for PAM—Installation and Configuration Guide for RHEL
Message Description
Reserve password not Verify that you are a root user. Only root
allowed. User is not root. users can use the reserve password.
File Description
securid This file contains a shared secret key used to protect the
communication between the local machine and
Authentication Manager. The name of this file is derived
from the local system's configured protocol name for the
port over which the agent communicates with
Authentication Manager, usually via the "services" file.
This file permission should be -r-------- root root.
However, it also depends on the OS Umask setting.
20
RSA Authentication Agent 7.1 for PAM—Installation and Configuration Guide for RHEL
File Description
SELinux
Custom Path
When SELinux is enabled, custom path settings for VAR_ACE and
RSATRACEDEST will not work
Workaround: The administrator has to perform the following steps to enable custom
path settings:
1. semanage fcontext -a -t var_t<custom_directory_path>
2. restorecon _R <custom_directory_path>
21
RSA Authentication Agent 7.1 for PAM—Installation and Configuration Guide for RHEL
6. Access the following files depending on the type of error messages, that you want
to view:
• For the “SELinux is preventing” type of error messages, see the
etc/var/log/messages file
• For the “access denied” type of error messages, see the
etc/var/log/audit/audit.log file
Note: These files contain the log IDs corresponding to the error message.
Configuring Tools
rlogin
Rlogin prompts for a password instead of a passcode, when ambiguous entries are
present in /etc/hosts file.
Workaround: If a machine name exists next to the loopback IP address and actual
machine address, then remove the machine name next to the loopback IP address;
rlogin will then behave as expected.
When a user tries to access the system using rlogin tool and enters wrong credentials,
the system redirects the authentication process to the telnet tool, and the system may
prompt for password/passcode as per the telnet configuration.
Workaround: When rlogin is protected with SecurID, telnet must also be protected
with SecurID and vice versa.
22
RSA Authentication Agent 7.1 for PAM—Installation and Configuration Guide for RHEL
January 2013
Trademarks
RSA, the RSA Logo and EMC are either registered trademarks or trademarks of EMC
Corporation in the United States and/or other countries. All other trademarks used herein are
the property of their respective owners. For a list of RSA trademarks, go to
www.rsa.com/legal/trademarks_list.pdf.
23