Conditions for using PAM

The PAM authentication and querying the UNIX system's password database(s) require specific privileges from the calling process. Therefore, the sagssxauthd2 module must be owned by the root user. It must reside on a file system which is not mounted with the nosuid option and the setuid file attribute must be enabled (the file access rights should look like -rwsr-xr-x ... root ... sagssxauthd2). The module is typically installed into the directory: /opt/softwareag/common/security/ssx/auth.

A PAM service ssxsrv has to be defined. In a Linux system, it is usually made available by copying the default configuration from /opt/softwareag/common/security/ssx/etc/ssxsrv.pamd into the respective system's directory as /etc/pam.d/ssxsrv. For other systems, you may need to add a corresponding entry to the central PAM configuration in /etc/pam.conf.

Before the service can be used, it needs to be configured according to your system's usage of PAM. Depending on your needs and your system's configuration, you may follow the example of the password-auth, common-auth, sshd or login PAM services.

If any of the listed conditions is not met, an error can occur. In this case, it is important to double-check the status of the sagssxauthd2 module. You may also want to contact IBM support for further assistance; in this case, you should also create an SSX trace to be sent to support.

Another source of failure is using an unsupported password hash algorithm for comparing the passwords returned by the operating system. SSX currently supports the following hash algorithms:

  • MD5 ($1$)
  • Long Blowfish ($2a$)
  • BCrypt ($2y$)
  • Short Blowfish ($2$)
  • SHA-256 ($5$)
  • SHA-512 ($6$)
  • DES