Index: openacs-4/packages/acs-authentication/www/doc/ext-auth-pam-install.html =================================================================== RCS file: /usr/local/cvsroot/openacs-4/packages/acs-authentication/www/doc/ext-auth-pam-install.html,v diff -u -r1.6.2.1 -r1.6.2.2 --- openacs-4/packages/acs-authentication/www/doc/ext-auth-pam-install.html 10 Aug 2019 15:15:49 -0000 1.6.2.1 +++ openacs-4/packages/acs-authentication/www/doc/ext-auth-pam-install.html 3 Jul 2020 07:53:44 -0000 1.6.2.2 @@ -59,7 +59,7 @@ /etc/pam.d/service0 with these contents:

auth       sufficient   /lib/security/pam_radius_auth.so
 
  • Modify the AOLserver configuration file to use - this PAM domain. Edit the line

    ns_param   PamDomain             "service0"

    So that the value of the parameter matches the name (just the file name, not the fully pathed name) of the domain file in

    /etc/pam.d/
  • LDAP in PAM. more information

  • Modify the AOLserver configuration file to support ns_pam. 

    In + this PAM domain. Edit the line

    ns_param   PamDomain             "service0"

    So that the value of the parameter matches the name (just the filename, not the fully pathed name) of the domain file in

    /etc/pam.d/
  • LDAP in PAM. more information

  • Modify the AOLserver configuration file to support ns_pam. 

    In /var/lib/aolserver/service0/etc/config.tcl, enable the nspam module by uncommenting this line:

    ns_param   nspam           ${bindir}/nspam.so
  • Install auth-pam OpenACS service package. Install auth-pam and restart the server.

  • Create an OpenACS authority. OpenACS supports multiple authentication authorities. The OpenACS server itself is the "Local Authority," used by default.

    1. Browse to the authentication administration page,