ports/net/tac_plus4/files/patch-users_guide.in
Joe Marcus Clarke 50fa622e20 net/tac_plus4: Be explicit about the runtime user
It occurred to me that the tacacs user is set only at build time.  So,
if someone assigned a different uid to their runtime tacacs user, the
daemon would, by default, run under uid 559. So, add a default
"-U tacacs" to the flags.

While here, fix a typo in the man page.
2024-08-26 09:17:33 -04:00

33 lines
1.2 KiB
Text

--- users_guide.in.orig 2011-05-27 22:11:57 UTC
+++ users_guide.in
@@ -164,8 +164,11 @@ suggest you try a web search for s/key source code.
crimelab.com but now it appears the only source is ftp.bellcore.com. I
suggest you try a web search for s/key source code.
-Note: S/KEY is a trademark of Bell Communications Research (Bellcore).
+To use OPIE, you must have built tac_plus with the -DWITH_OPIE flag.
+Note: S/KEY and OPIE are a trademark of Bell Communications Research
+(Bellcore).
+
Should you need them, there are routines for accessing password files
(getpwnam,setpwent,endpwent,setpwfile) in pw.c.
@@ -414,7 +417,16 @@ be authenticated via s/key, as follows:
login = skey
}
-4). Authentication using PAM (Pluggable Authentication Modules)
+4). Authentication using opie.
+
+If you have successfully built tac_plus with opie support, you can specify
+a user be authenticated via opie, as follows:
+
+ user = marcus {
+ login = opie
+ }
+
+5). Authentication using PAM (Pluggable Authentication Modules)
Assuming that your OS supports it, tac_plus can be configured to use PAM
for authentication, which may make it possible to use LDAP, SecureID, etc