Solved

passwd permission denied

Posted on 2009-04-07
3
1,831 Views
Last Modified: 2013-12-21
Hello

I have joined my Solaris 10 u6 box to my Win 2003 AD domain using the following process
http://nineproductions.com/technology/1-sun-solaris/3-solaris-10-samba-zfs-configuration.html

now when i run  'passwd -r files root' i get
'passwd -r files root
New Password:
Permission denied'

this applies to all local user accounts on the Solaris system.

Any suggestions?
0
Comment
Question by:f3tpadmin
  • 2
3 Comments
 

Author Comment

by:f3tpadmin
ID: 24091061
Just to add another piece of info,  I found out that the line

'other   password required       pam_winbind.so'

in /etc/pam.conf seems to be causing the problem...  but not sure what the solution is.
0
 
LVL 22

Expert Comment

by:blu
ID: 24096308
How did you determine that the problem is with pam_winbind? What do you get as output from "wbinfo -u" and
"wbinfo -g"?
0
 

Accepted Solution

by:
f3tpadmin earned 0 total points
ID: 24096529
wbinfo -u and wbinfo -g gives me the correct users and groups of my AD domain.

I determined it was pam_winbind as it works with password management.

It was set to required, the solution was to set it to sufficient.  This has to do with how PAM authentication works, with sufficient if winbind.so fails, the operation fails unless a module             invoked after it succeeds. Important to note is that if a 'required'             module fails before a 'sufficient' one succeeds, the operation will             fail anyway, ignoring the status of any 'sufficient' modules.

All is well now.



# Default definition for  Password management

# Used when service name is not explicitly mentioned for password management

#

other   password required       pam_dhkeys.so.1

other   password requisite      pam_authtok_get.so.1

other   password requisite      pam_authtok_check.so.1

other   password sufficient     pam_winbind.so

other   password required       pam_authtok_store.so.1

Open in new window

0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

SHARE your personal details only on a NEED to basis. Take CHARGE and SECURE your IDENTITY. How do I then PROTECT myself and stay in charge of my own Personal details (and) - MY own WAY...
Container Orchestration platforms empower organizations to scale their apps at an exceptional rate. This is the reason numerous innovation-driven companies are moving apps to an appropriated datacenter wide platform that empowers them to scale at a …
Learn several ways to interact with files and get file information from the bash shell. ls lists the contents of a directory: Using the -a flag displays hidden files: Using the -l flag formats the output in a long list: The file command gives us mor…
Learn how to navigate the file tree with the shell. Use pwd to print the current working directory: Use ls to list a directory's contents: Use cd to change to a new directory: Use wildcards instead of typing out long directory names: Use ../ to move…

863 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

20 Experts available now in Live!

Get 1:1 Help Now