Using PAM (Pluggable Authentication Modules) for Browser Authentication
Login using Web Browsers
For CLI and GUI commands, the user is already authenticated by the operating system login, and VOV programs are run as the logged-in user.
The vovserver program natively supports HTTP for VOV's
browser-based user interface. When a browser connects to the vovserver, the user may wish to authenticate as one other than the
user running the browser program on the remote host. Also, remote users can have
complete administrative control of the host where the browser runs, and be spoofing
another user's login name. Hence, VOV asks for a username and password, and uses
these to authenticate the user on the host where the vovserver
runs.
Once a user has authenticated with a given login name, their VOV privilege level with respect to VOV operations is determined by the security.tcl configuration file for that vovserver. Please refer to VOV Security.
Authentication Mechanisms
The vovserver is a PAM-aware application: its authentication may
be changed without recompiling the program. On Linux and MacOS-X, the
vovserver uses vovpamauth
which in turn uses
PAM to authenticate users.
On other platforms, vovserver uses the regular
crypt()
method to accept the provided password.
Authentication Control
# force PAM to be used when available
set config(enablePam) 1
% vovproject enable some-ft-project
% vovsh -x 'puts [vtk_server_config enablepam 1]'
# Example of a vovauth file. Only the auth part is required.
auth sufficient pam_rootok.so
auth required pam_opendirectory.so