Ето аз какво съм правил, но не е към Windows директори сървър, а към apacheDS, което е някаква имплементация на openldap.
passwd: files ldap
group: files ldap
shadow: files ldap
Освен това винаги съм имал проблеми да пусна криптирането на връзката с нещо различно от crypt. А крипт гледа първите 5 символа от паролата, ама не е кой знае какъв проблем.
В туториала не намерих къде е
/etc/ldap.confТам има настройки на криптирането и връзката със сървъра.
Edit: ето ги моите файлове в pam.d
common-password# here are the per-package modules (the "Primary" block)
password [success=2 default=ignore] pam_unix.so obscure sha512
password [success=1 user_unknown=ignore default=die] pam_ldap.so use_authtok try_first_pass
# here's the fallback if no module succeeds
password requisite pam_deny.so
# prime the stack with a positive return value if there isn't one already;
# this avoids us returning an error just because nothing sets a success code
# since the modules above will each just jump around
password required pam_permit.so
# and here are more per-package modules (the "Additional" block)
password optional pam_gnome_keyring.so
# end of pam-auth-update config
common-session #here are the per-package modules (the "Primary" block)
session [default=1] pam_permit.so
# here's the fallback if no module succeeds
session requisite pam_deny.so
# prime the stack with a positive return value if there isn't one already;
# this avoids us returning an error just because nothing sets a success code
# since the modules above will each just jump aroun
session required pam_permit.so
session required pam_mkhomedir.so skel=/etc/skel/
# The pam_umask module will set the umask according to the system default in
# /etc/login.defs and user settings, solving the problem of different
# umask settings with different shells, display managers, remote sessions etc.
# See "man pam_umask".
session optional pam_umask.so
# and here are more per-package modules (the "Additional" block)
session required pam_unix.so
session optional pam_ldap.so
session optional pam_systemd.so
session optional pam_ck_connector.so nox11
# end of pam-auth-update config
common-auth# here are the per-package modules (the "Primary" block)
auth required pam_tally.so onerr=fail deny=3 unlock_time=300
auth [success=2 default=ignore] pam_unix.so nullok_secure
auth [success=1 default=ignore] pam_ldap.so use_first_pass
# here's the fallback if no module succeeds
auth requisite pam_deny.so
# prime the stack with a positive return value if there isn't one already;
# this avoids us returning an error just because nothing sets a success code
# since the modules above will each just jump around
auth required pam_permit.so
# and here are more per-package modules (the "Additional" block)
auth optional pam_cap.so
# end of pam-auth-update config