RADIUS server for SSH authorization

 
Thread Tools Search this Thread
Operating Systems Linux Red Hat RADIUS server for SSH authorization
# 1  
Old 05-03-2011
RADIUS server for SSH authorization

Good day to anyone. I need your help.
I want to create a centralization server for authorization my users via SSH connections. My manager suggested me a RADIUS + PAM, but frankly speaking I read a lot information about these and understood one thing - RADIUS could work only with password authorization. It means I should create users without password on every RHEL system. I tested for myself freeradius and I think this soft can't create and keep users accounts with right permissions (gid, uid, group) - ONLY password authorization. Am I right ? I really read a lot documents in the Internet and all manual include next step "... you must create a user on client server for login ..."

What I need. I want to have clear server which will be setted on authorization server. Withous any users and groups. Clear. I'll connect from my PC via SSH to some server and last one should request information about my account from authorization server. Then it should load my defauld profile, permissions and "clear system" which hasn't any users and group shoud understand my rights (gid, uid, group).

Is it possible ? I think try LDAP+PAM+SSH. Any ideas ?
Thanks and sorry for my bad english.
Login or Register to Ask a Question

Previous Thread | Next Thread

5 More Discussions You Might Find Interesting

1. UNIX for Advanced & Expert Users

Radius authorization on Linux clients

Hello folks, I was guessing if there is a way for configuring Radius authorization on Linux clients. My meaning is to make Radius server manage the authorization/permissions when executing any commnand on my linux servers. Then, there's any way to configure this with Radius? can I also... (1 Reply)
Discussion started by: carpannav
1 Replies

2. Shell Programming and Scripting

Connect (SSH) to Windows server via Linux server through a script and passing command.. but failing

I am trying to connect to Windows server via Linux server through a script and run two commands " cd and ls " But its giving me error saying " could not start the program" followed by the command name i specify e g : "cd" i am trying in this manner " ssh username@servername "cd... (5 Replies)
Discussion started by: sunil seelam
5 Replies

3. Shell Programming and Scripting

Using ssh to add register key on ssh server

Hi, I want to use ssh to add a register key on remote ssh server. Since there are space characters in my register key string, it always failed. If there is no space characters in the string, it worked fine. The following is what I have tried. It seems that "ssh" command doesn't care about double... (9 Replies)
Discussion started by: leaftree
9 Replies

4. IP Networking

Authentication WAP with RADIUS Server

Network Configuration Figure http://geocities.com/fy_heng/test1.JPG Dear all, I currently performing an testing using the above network configuration (Please click on the above link). On how actually the RADIUS server can authenticate the user who connect to the WAP (wireless access point)... (0 Replies)
Discussion started by: Paris Heng
0 Replies

5. Cybersecurity

What's the difference between an SSH Client and an SSH Server?

Eh... yeah. What the title says. :D (1 Reply)
Discussion started by: PSC
1 Replies
Login or Register to Ask a Question
RADIUS.CONF(5)						    InterNetNews Documentation						    RADIUS.CONF(5)

NAME
radius.conf - Configuration for nnrpd RADIUS authenticator DESCRIPTION
This describes the format and attributes of the configuration file for the nnrpd RADIUS authenticator. See radius(1) for more information about the authenticator program. The default location for this file is radius.conf in pathetc. Blank lines and lines beginning with "#" are ignored, as is anything after a "#" on a line. All other lines should begin with a parameter name followed by a colon and the value of that key, except that each section of configuration for a particular server should be enclosed in: server <name> { # parameters... } where <name> is just some convenient label for that server. The available parameters are: radhost The hostname of the RADIUS server to use for authentication. This parameter must be set. radport The port to query on the RADIUS server. Defaults to 1645 if not set. lochost The hostname or IP address making the request. The RADIUS server expects an IP address; a hostname will be translated into an IP address with gethostbyname(). If not given, this information isn't included in the request (not all RADIUS setups require this information). locport The port the client being authenticated is connecting to. If not given, defaults to 119. This doesn't need to be set unless readers are connecting to a non-standard port. secret The shared secret with the RADIUS server. If your secret includes spaces, tabs, or "#", be sure to include it in double quotes. This parameter must be set. prefix Prepend the value of this parameter to all usernames before passing them to the RADIUS server. Can be used to prepend something like "news-" to all usernames in order to put news users into a different namespace from other accounts served by the same server. If not set, nothing is prepended. suffix Append the value of this parameter to all usernames before passing them to the RADIUS server. This is often something like "@example.com", depending on how your RADIUS server is set up. If not set, nothing is appended. ignore-source Can be set to "true" or "false". If set to false, the RADIUS authenticator will check to ensure that the response it receives is from the same IP address as it sent the request to (for some added security). If set to true, it will skip this verification check (if your RADIUS server has multiple IP addresses or if other odd things are going on, it may be perfectly normal for the response to come from a different IP address). EXAMPLE
Here is a configuration for a news server named news.example.com, authenticating users against radius.example.com and appending "@example.com" to all client-supplied usernames before passing them to the RADIUS server: server example { radhost: radius.example.com lochost: news.example.com secret: IamARADIUSsecRET suffix: @example.com } The shared secret with the RADIUS server is "IamARADIUSsecRET". HISTORY
This documentation was written by Russ Allbery <rra@stanford.edu> based on the comments in the sample radius.conf file by Yury B. Razbegin. $Id: radius.conf.pod 8200 2008-11-30 13:31:30Z iulius $ SEE ALSO
radius(1) INN 2.5.3 2009-05-21 RADIUS.CONF(5)