Sponsored Content
Full Discussion: Login takes 44secs to 50secs
Operating Systems Solaris Login takes 44secs to 50secs Post 302559739 by sbk1972 on Wednesday 28th of September 2011 04:20:52 AM
Old 09-28-2011
Check DNS resolution / pam.conf / login authentication. what you are seeing is the server timing out trying to either authenticate the user id, or trying to mount the users home directory, or something user related.

If you can logging in as root, then I reckon its DNS/ nsswitch.conf / resolv.conf or something like that which is pointing to the wrong server. Even check /etc/defaultrouter.

SBK
 

8 More Discussions You Might Find Interesting

1. News, Links, Events and Announcements

SCO takes one in the pants...

I know this may be in the wrong forum but it will be seen more often here... WOW!! Someone is really mad at SCO regarding their latest attempt to push around the free Linux world... But seems someone did the old rockem sockem to SCO!! ... (6 Replies)
Discussion started by: Kelam_Magnus
6 Replies

2. UNIX for Advanced & Expert Users

Login Process takes longer

Hello. Since Yesterday, I notice that after giving telnet IP or SSH IP - it takes long time to display login: , I mean earlier after entering Server name It used to immediately ask for login ID and then password. But, now it takes min of 2-3 minute to ask for password. Where can I check,... (12 Replies)
Discussion started by: panchpan
12 Replies

3. Shell Programming and Scripting

script takes params

i want to write a shell script that can be run as ./deployPortal.sh -version 5.1.2 -portlet -exportall how can i do that? version param is required. bu the others are optional. in first step i only want to read 5.1.2, is portlet selected ? and is exportall selected ?? can you... (2 Replies)
Discussion started by: keromotti
2 Replies

4. Cybersecurity

APACHE: Tie in Web Page login with server login

Hello, I have created a web page on a server using apache and added .htaccess and .htpasswd in the folder for authentification. I was wondering if there was anyway to tie-in the login for this page with the login used to logon to the server. i.e. the same login info. is used for both, when... (1 Reply)
Discussion started by: WhotheWhat
1 Replies

5. Linux

it takes long time to login on server

Hi, I am trying to login using ssh on Red Hat Linux 5 server, The password appears immediately but after I enter the password it takes about 90 seconds to login completely. Please suggest what changes require? Regards, Manoj (4 Replies)
Discussion started by: manoj.solaris
4 Replies

6. Red Hat

Login to server takes time

When I am trying to login to a server using Putty ssh from my windows xp machine it is taking too much time for login. My server name is http2 and when I enter this address into putty I immediately get login as: screen, but after I put my username root and enter the cursor moves downwards... (14 Replies)
Discussion started by: abhilashkrishn
14 Replies

7. Shell Programming and Scripting

How to takes missing files

Hi Am using unix aix I have a group of files in File1 For ex:- Vi file1 A0405 A0605 A0805 When i tried using awk command am getting an error as No space a=`awk 'NF < 1 {next;} p && p != $1 { for( i = p; i < $1; i++ )print i; } {p = $1 + 1 }' file2` Error message:- + + awk NF <... (7 Replies)
Discussion started by: Venkatesh1
7 Replies

8. Shell Programming and Scripting

How to takes the missing files?

Hi all , am using unix aix I have a files in one directory.. my files as in format qqss0607.ddd.. (06 is date 07 is month) how to check the missing dates .... can anyone tell me... (9 Replies)
Discussion started by: Venkatesh1
9 Replies
pam_krb5(5)							File Formats Manual						       pam_krb5(5)

NAME
pam_krb5 - authentication, account, session and password management modules for Kerberos 5 SYNOPSIS
/usr/lib/security/$ISA/libpam_krb5.so.1 DESCRIPTION
The KRB5 PAM modules allow integration of Kerberos authentication into the system entry services (such as login, using pam.conf(4) configu- ration file. The Kerberos service module for PAM consists of the following three modules: the authentication module, the account management module and the password module. It also provides null functions for session management. All modules are supported through the same dynami- cally loadable library. The KRB5 PAM modules are compatible with MIT Kerberos 5 and Microsoft Windows 2000. Authentication Module The authentication module verifies the user identity and sets the user credentials. It passes the authentication key derived from the user's password to the Kerberos security service. The security service uses the authentication key to verify the user and issues a ticket- granting ticket. The credential management function sets user specific credentials. It stores the credentials in a cache file and exports the environment variable KRB5CCNAME to identify the cache file. The cache file is stored in /tmp/pam_krb5/creds directory. This module cre- ates a unique cache file for every session. The credentials cache should be destroyed by the user at logout with kdestroy(1m). The following options may be passed to the authentication module through pam.conf(4): debug This option allows syslog(3C) debugging information at LOG_DEBUG level. use_first_pass This option allows the initial password (entered when the user is authenticated to the first authentication module in the stack) to authenticate with Kerberos. If the user cannot be authenticated or if this is the first authentication module in the stack, quit without prompting for a password. It is recommended that this option be used only if the authentication mod- ule is designated as optional in the pam.conf(4) configuration file. try_first_pass This option allows the initial password (entered when the user is authenticated to the first authentication module in the PAM stack) to authenticate with Kerberos. If the user cannot be authenticated or if this is the first authentication module in the stack, prompt for a password. forwardable This option allows a ticket-granting ticket with a different network address than the present ticket-granting ticket to be issued to the user. For forwardable tickets to be granted, the user's account in Kerberos must specify that the user can be granted forwardable tickets. renewable=<time> This option allows tickets issued to the user to be renewed. For renewable tickets to be granted, the user's account in Ker- beros must specify that the user can be granted renewable tickets. The renewal time of the ticket-granting ticket is speci- fied by <time>. The form of time is the same as the one in kinit(1m). proxiable This option allows a ticket with a different network address than the present ticket to be issued to the user. For proxiable tickets to be granted, the user's account in Kerberos must specify that the user can be granted proxiable tickets. ignore Returns PAM_IGNORE. Generally this option should not be used. But sometimes it may not be desirable or may not be necessary to authenticate certain users (root, ftp, ...) with Kerberos. In such cases you can use this option in pam_user.conf(4) for per user configuration. It is not recommended for you to use this option in pam.conf(4). See the examples section. Account Management Module The account management module provides a function to perform account management. This function retrieves the user's account and password expiration information from Kerberos database and verifies that they have not expired. The module does not issue any warning if the account or the password is about to expire. The following options can be passed to the Account Management module through pam.conf(4): debug This option allows syslog(3C) debugging information at LOG_DEBUG level. ignore Returns PAM_IGNORE. Generally this option should not be used. But sometimes it may not be desirable or may not be necessary to authenticate certain users (root, ftp, ...) with Kerberos. In such cases you can use this option in pam_user.conf(4) for per user configuration. It is not recommended for you to use this option in pam.conf(4). See the examples section. Password Management Module The password management module provides a function to change passwords in the Kerberos password database. Unlike when changing a Unix pass- word, the password management module will allow any user to change any other's password(if the user knows the other's old password, of course). Also unlike Unix, root is always prompted for the user's old password. The following options can be passed into the password module through the pam.conf(4) file: debug This option allows syslog(3C) debugging information at LOG_DEBUG level. use_first_pass This option allows the initial password (entered when the user is authenticated to the first authentication module in the stack) to authenticate with Kerberos. If the user cannot be authenticated or if this is the first authentication module in the stack, quit without prompting for a password. It is recommended that this option be used only if the authentication mod- ule is designated as optional in the pam.conf(4) configuration file. try_first_pass This option allows the initial password (entered when the user is authenticated to the first authentication module in the PAM stack) to authenticate with Kerberos. If the user cannot be authenticated or if this is the first authentication module in the stack, prompt for a password. ignore Returns PAM_IGNORE. Generally this option should not be used. But sometimes it may not be desirable or may not be necessary to authenticate certain users (root, ftp, ...) with Kerberos. In such cases you can use this option in pam_user.conf(4) for per user configuration. It is not recommended for you to use this option in pam.conf(4). See the examples section. Session Management Module The session management module provides functions to initiate and terminate sessions. Since session management is not defined under Ker- beros, both of these functions simply return PAM_SUCCESS. They are provided only because of the naming conventions for PAM modules. The following options can be passed into the session management module through the pam.conf(4) file: debug This option allows syslog(3C) debugging information at LOG_DEBUG level. ignore Returns PAM_IGNORE. Generally this option should not be used. But sometimes it may not be desirable or may not be necessary to authenticate certain users (root, ftp, ...) with Kerberos. In such cases you can use this option in pam_user.conf(4) for per user configuration. It is not recommended for you to use this option in pam.conf(4). See the examples section. EXAMPLE
Following is a sample configuration in which no authentication is done with Kerberos for root ie. KRB5 PAM module does nothing. It just returns PAM_IGNORE for user root. For every user other than root, it will try to authenticate using Kerberos. If Kerberos succeeds, the user is authenticated. If Kerberos fails to authenticate the user, PAM will try to authenticate via UNIX PAM using same the password. PAM_IGNORE for user root. pam_user.conf: # configuration for user root. KRB5 PAM module uses the # ignore option and returns PAM_IGNORE root auth libpam_krb5.so.1 ignore root password libpam_krb5.so.1 ignore root account libpam_krb5.so.1 ignore root session libpam_krb5.so.1 ignore pam.conf: # For per user configuration the libpam_updbe.so.1 (pam_updbe(5)) module # must be the first module in the stack. If Kerberos authentication # is valid the UNIX authentication function will not be invoked. login auth required libpam_hpsec.so.1 login auth required libpam_updbe.so.1 login auth sufficient libpam_krb5.so.1 login auth required libpam_unix.so.1 try_first_pass login password required libpam_hpsec.so.1 login password required libpam_updbe.so.1 login password required libpam_krb5.so.1 login password required libpam_unix.so.1 try_first_pass login account required libpam_hpsec.so.1 login account required libpam_updbe.so.1 login account required libpam_krb5.so.1 login account required libpam_unix.so.1 login session required libpam_hpsec.so.1 login session required libpam_updbe.so.1 login session required libpam_krb5.so.1 login session required libpam_unix.so.1 NOTES
The use of pam_hpsec is mandatory for services like login, dtlogin, su, ftp, rcomds and sshd (see attached pam.conf). It is required that these services stack this module above one or more additional modules such as pam_unix, pam_kerberos, etc... However, for 'OTHER' services, pam_hpsec is not configured by default. System administrators and application writers must consider whether it is appropriate to use pam_hpsec for any given application. SEE ALSO
pam(3), pam_authenticate(3), pam_setcred(3), syslog(3C), pam.conf(4), pam_user.conf(4), pam_updbe(5), kinit(1m), klist(1m), kdestroy(1m) pam_krb5(5)
All times are GMT -4. The time now is 12:15 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy