Unchallenged Active Directory users fail to authenticate with RSA Authentication Agent for PAM
Originally Published: 2020-01-21
Article Number
Applies To
RSA Product/Service Type: Authentication Agent for PAM
Issue
Cause
#%PAM-1.0 auth required pam_securid.so #auth required pam_sepermit.so #auth substack password-auth #auth include postlogin
That is acceptable if the environment is dealing with internal Linux users, as pam_securid.so can handle both SecurID authentication and Linux authentication. However, when it gets to Active Directory users, pam_securid.so cannot handle Active Directory authentication.
Resolution
This configuration authenticates the SecurID passcode first then the AD password for challenged users and only the AD password for unchallenged users. In this example, assume that AD integration is using WinBind.
- In /etc/sd_pam.conf, change both PAM_IGNORE_SUPPORT_FOR_USERS and PAM_IGNORE_SUPPORT to 1, as shown in bold:
#PAM_IGNORE_SUPPORT_FOR_USERS # :: 1 to return PAM_IGNORE if a user is not SecurID authenticated due to user exclusion support # :: 0 to UNIX authenticate a user that is not SecurID authenticated due to user exclusion support # default value is 0 PAM_IGNORE_SUPPORT_FOR_USERS=1 #PAM_IGNORE_SUPPORT # :: 1 to return PAM_IGNORE if a user is not SecurID authenticated due to their group membership # :: 0 to UNIX authenticate a user that is not SecurID authenticated due to their group membership # default value is 0 PAM_IGNORE_SUPPORT=1
- In the protected module (for example, sshd /etc/pam.d/sshd), change the auth config to be as follows.
auth required pam_securid.so not_set_pass auth required pam_windbind.so #auth required pam_sepermit.so #auth substack password-auth #auth include postlogin
auth [success=done ignore=ignore default=die] pam_securid.so not_set_pass auth required pam_windbind.so #auth required pam_sepermit.so #auth substack password-auth #auth include postlogin
Related Articles
How to authenticate to an RSA Authentication Agent for Windows as user@domain.com with NTLM to UPN name mapping 504Number of Views RSA PAM Authentication Agent cannot challenge users in Active Directory groups 264Number of Views Unable to authenticate with Authentication Agent for PAM for SSH due to SELinux 193Number of Views Users cannot authenticate with login name in domain\sAMAccountName format using MFA Agent 2.0.1 76Number of Views Allow Users to Authenticate on an Agent 23Number of Views
Trending Articles
Troubleshooting RSA SecurID Access Identity Router to RSA Authentication Manager test connection failures RSA SecurID Software Token 5.0.2 Downloads for Microsoft Windows RSA Authentication Manager 8.9 Release Notes (January 2026) Quick Setup Guide - Passwordless Authentication in Windows MFA Agent for Active Directory RSA Authentication Manager 8.8 Setup and Configuration Guide
Don't see what you're looking for?