Defender PAM logging
The Defender PAM logs the RADIUS server responses for all failed authentication attempts to the system logger at the Info level. To do that the Defender PAM uses the auth or authpriv facility, depending on platform.
You can enable trace level logging for troubleshooting purposes.
To enable trace level logging
- Make sure the /tmp/pam_def.ini file exists on your system. The file must specify a location to a log file as well as a trace level.
Example:
filename=/tmp/pam_defender_trace.log
level=0xffffffff
- Append the debug argument to the auth entries for the Defender PAM in the system PAM configuration.
Auth arguments
The following table lists the arguments you can append to the auth entries for the Defender PAM in the system PAM configuration.
Table 30:
Auth arguments
debug |
Enables trace level logging for the Defender PAM entries in the system PAM configuration to which this argument is added. For instructions on how to enable trace level logging, see Defender PAM logging. |
skip_password |
Causes the Defender PAM to display the “Enter Synchronous Response:” prompt to the user, instead of the “Passcode:” prompt. |
use_first_pass |
Causes the Defender PAM to use the PAM_AUTHTOK item as the user’s passcode. In this case, the user is not prompted to enter a passcode.
If the PAM_AUTHTOK item is not set, authentication fails. |
try_first_pass |
Causes the Defender PAM to use the PAM_AUTHTOK item in the PAM stack as the user’s passcode.
If the PAM_AUTHTOK item is not set, the Defender PAM prompts the user for a passcode. |
conf=<path to Defender configuration file> |
Allows you to specify an alternate location for the defender.conf file. The default location is /etc/defender.conf. |
client_id=<client ID> |
Allows you to specify the client ID for accounting requests which are validated during the pam_session call. When no client ID specified, the PAM service name is used as the client ID. |
Delegating Defender roles, tasks, and functions
Defender provides a scalable approach to the administration of access rights, enabling you to delegate specific Defender roles, tasks, and functions to the users or groups you want.
The Defender Administration Console provides a wizard you can use to search for and select one or multiple user accounts, and then choose which Defender roles or tasks you want these accounts to perform.
Besides delegating roles or tasks, you can delegate specific Defender functions, for example, appoint selected user accounts as service accounts for the Defender Security Servers or Defender Management Portal, or grant full control over particular Defender objects, such as Access Nodes, Defender Security Servers, licenses, RADIUS payloads, or security tokens.
Steps to delegate roles, tasks, and functions
You can delegate Defender roles, tasks, or functions to specific users or groups by using the Defender Delegated Administration Wizard.
To delegate Defender roles, tasks, or functions
- On the computer where the Defender Administration Console is installed, open the Active Directory Users and Computers tool (dsa.msc).
- In the left pane (console tree), expand the appropriate domain node, and click to select the Defender container.
- On the menu bar, select Defender | Delegate Control.
Step through the wizard.
- In the Users and Groups step, add the user accounts or groups to which you want to delegate Defender roles, tasks, or functions. Click Next.
- In the Tasks to Delegate step, select the check boxes next to the Defender roles, tasks, or functions you want to delegate. Click Next.
For more information, see:
- Follow the steps in the wizard to complete delegating the roles, tasks, or functions.
The wizard does not modify any standard Active Directory permissions. Rather, it modifies permissions on the Defender attributes in the Active Directory schema.