Univention Bugzilla – Bug 36317
S4 connector removes shadowMax and shadowLastChange on password change via samba/kerberos
Last modified: 2018-09-05 00:53:50 CEST
The connector removes shadowMax and shadowLastChange if the password is set via samba. The connector should properly set these attributes -> shadowLastChange (days since 1970-01-01 00:00:00 UTC) -> shadowMax keep if existing
Due to this bug login to UMC fails after UMC password change of an expired password. univention-managmenet-server.log shows: 31.10.14 19:19:16.371 AUTH ( ERROR ) : PAM: acct_mgmt error: ('Authentifizierungstoken ist nicht mehr g?ltig; neues erforderlich', 12) Login works again after raising shadowLastChange (or removing pam_unix from the acct section of the pam stack).
Ignore comment 1, I had temporarily stopped the S4 connector on my testing system.
Bug also seen in customer environment. Ticket#2014110621000331
YAML: 2015-03-03-univention-s4-connector.yaml The connector now always sets shadowLastChange to "days since epoch" and shadowMax to None or the value of the univentionPWExpiryInterval policy for this object. test: 52_s4connector/401check_posix_pwd_expiry_after_ad_pwdchange QA: * Without policy: shadowLastChange=now, no shadowMax after password change via s4 * With policy: shadowLastChange=now, shadowMax=X after password change via S4 * Without policy but with pwdChangeNextLogin=1: shadowLastChange=now, no shadowMax after password change via s4 * ...
As discussed, please set also krb5PasswordEnd.
OK, the connector now sets krb5PasswordEnd if univentionPWExpiryInterval exists, otherwise krb5PasswordEnd is deleted.
YAML: OK (minor changes: r58827) ucs-test: OK Tests: OK Code review: OK
http://errata.univention.de/ucs/4.0/97.html