The Defender PAM logs the RADIUS server responses for all failed authentication attempts to the system logger at the Info level. To do that the Defender PAM uses the auth or authpriv facility, depending on platform.
You can enable trace level logging for troubleshooting purposes.
To enable trace level logging
Example:
filename=/tmp/pam_defender_trace.log
level=0xffffffff
The following table lists the arguments you can append to the auth entries for the Defender PAM in the system PAM configuration.
Argument |
Description |
debug |
Enables trace level logging for the Defender PAM entries in the system PAM configuration to which this argument is added. For instructions on how to enable trace level logging, see Defender PAM logging. |
skip_password |
Causes the Defender PAM to display the “Enter Synchronous Response:” prompt to the user, instead of the “Passcode:” prompt. |
use_first_pass |
Causes the Defender PAM to use the PAM_AUTHTOK item as the user’s passcode. In this case, the user is not prompted to enter a passcode. If the PAM_AUTHTOK item is not set, authentication fails. |
try_first_pass |
Causes the Defender PAM to use the PAM_AUTHTOK item in the PAM stack as the user’s passcode. If the PAM_AUTHTOK item is not set, the Defender PAM prompts the user for a passcode. |
conf=<path to Defender configuration file> |
Allows you to specify an alternate location for the defender.conf file. The default location is /etc/defender.conf. |
client_id=<client ID> |
Allows you to specify the client ID for accounting requests which are validated during the pam_session call. When no client ID specified, the PAM service name is used as the client ID. |
Defender provides a scalable approach to the administration of access rights, enabling you to delegate specific Defender roles, tasks, and functions to the users or groups you want.
The Defender Administration Console provides a wizard you can use to search for and select one or multiple user accounts, and then choose which Defender roles or tasks you want these accounts to perform.
Besides delegating roles or tasks, you can delegate specific Defender functions, for example, appoint selected user accounts as service accounts for the Defender Security Servers or Defender Management Portal, or grant full control over particular Defender objects, such as Access Nodes, Defender Security Servers, licenses, RADIUS payloads, or security tokens.
You can delegate Defender roles, tasks, or functions to specific users or groups by using the Defender Delegated Administration Wizard.
To delegate Defender roles, tasks, or functions
Step through the wizard.
For more information, see:
The wizard does not modify any standard Active Directory permissions. Rather, it modifies permissions on the Defender attributes in the Active Directory schema.
© 2024 One Identity LLC. ALL RIGHTS RESERVED. Termini di utilizzo Privacy Cookie Preference Center