
IST-033576 D2.1.4
reference to the pam_xos module can be added to the /etc/pam.d/su config-
uration file of su in order to add xos authentication capability to the su command:
root: cat /etc/pam.d/su
#%PAM-1.0
...
auth sufficient /usr/local/lib/pam_xos.so
...
root:
For this validation, only the two experimental codes delivered with this proto-
type, pam_app_conv and ssh-xos, will be configured to use XtreemOS.
The behaviour of this first prototype can also be configured in the /etc/xos
directory:
pam_xos.conf - to configure the PAM module
nss_xos.conf - to configure the NSS modules
amappedfile - to define the mapping rules of account mapping
gmappedfile - to define the mapping rules of group mapping
policy - to define the default policy
3.3 Certificate configuration
In order to test the NSS and PAM modules, we need a valid user proxy generated
from a valid user certificate. The XtreemOS svn provides sample globus-based
certificates (in user_cert.tar.gz and ca_cert.tar.gz). The following
steps show how to create a valid local certification authority, how the user gener-
ates a certificate request, how the local certification authority signs this certificate
and, finally, the creation of a proxy with the necessary attributes.
3.3.1 Certificate authority Certificate generation
Self-signed certificate generation for XtreemOS-Yvon certificate authority:
ca: openssl req -new -x509 -days 1095
-keyout security/private/XtreemOS-ca.key
-out security/XtreemOS-ca.crt
Generating a 1024 bit RSA private key
..............................++++++
......................................................++++++
writing new private key to
’security/private/XtreemOS-ca.key’
Enter PEM pass phrase:
Verifying - Enter PEM pass phrase:
XtreemOS–Integrated Project 14/49
Comments to this Manuals