This plugin enables the delegation of SonarQubeTM authentication SonarQube authentication to underlying PAM subsystem. The plugin works on *nix box boxes with the Pluggable Authentication Module (PAM).
Only password-checking is done against PAM. Authorization (access control) is still fully managed in SonarQubeTM. A SonarQubeTM account must be created first for each new user wishing to use SonarQubeTM. The System administrator should also . During the first authentication trial, if the password is correct, the SonarQube database is automatically populated with the new user. The System administrator should assign the user to the desired groups in order to grant him necessary rights. If a password exists , the password in the SonarQube TM account database, it will be ignored as because the external system password will override it.
OS and Architecture
Mac OS X PPC
Windows all flavours
- Install jpam
- Install SonarQubeTM PAM plugin
Place the jar plugin into the through the Update Center or download it into the SONARQUBE_HOME/extensions/plugins directory directory
- Make sure that at least one user with global administration role exists in SonarQube TM as well as in the external system
Update the SONARQUBE_HOME/conf/sonar.properties file by adding the following lines:
Code Block borderStyle dashed title sonar.properties
sonar.security.realm: PAM pam.serviceName=system-auth # Automatically create users. # When set to true, user will be created after successful authentication, if doesn't exists. # The default group affected to new users can be defined online, in SonarQube general settings. The default value is "sonar-users". # Default is false.
Restart SonarQube TM and check logs for:
Code Block borderStyle dashed
2012.11.24 20:32:34 INFO org.sonar.INFO Security realm: PAM 2012.11.24 20:32:34 INFO org.sonar.INFO Security realm started
- Log in to SonarQubeTM
Crash using PAM winbind authentication (pam_winbind.so)
In case of an unsucessful login for wrong a bad password /or a locked out account (wrong a bad username does not produce the same issue) you may get this kind of error while using pam winbind authentication:
INFO | jvm 1 | 2011/03/18 10:06:10 | *** glibc detected *** java: free(): invalid pointer: 0x00002aaadc000168 *** INFO | jvm 1 | 2011/03/18 10:06:10 | ======= Backtrace: ========= INFO | jvm 1 | 2011/03/18 10:06:10 | /lib64/libc.so.6[0x3b9527245f] INFO | jvm 1 | 2011/03/18 10:06:10 | /lib64/libc.so.6(cfree+0x4b)[0x3b952728bb] INFO | jvm 1 | 2011/03/18 10:06:10 | /lib64/security/pam_winbind.so[0x2aaadaddc8f9] INFO | jvm 1 | 2011/03/18 10:06:10 | /lib64/security/pam_winbind.so[0x2aaadaddee4c] INFO | jvm 1 | 2011/03/18 10:06:10 | /lib64/security/pam_winbind.so(pam_sm_authenticate+0x304)[0x2aaadaddf9e4] INFO | jvm 1 | 2011/03/18 10:06:10 | /lib64/libpam.so.0(_pam_dispatch+0x277)[0x3b97e02dc7] INFO | jvm 1 | 2011/03/18 10:06:10 | /lib64/libpam.so.0(pam_authenticate+0x42)[0x3b97e026d2]
In this case SonarQube TM crashes and restarts automatically.
As far as I understand it's It appears to be a pam_winbind.so issue. I've found this workaroundThis workaround is available:
- Edit /etc/security/pam_winbind.conf:
Set Kerberos authentication:
Code Block borderStyle dashed title /etc/security/pam_winbind.conf
# # pam_winbind configuration file # # /etc/security/pam_winbind.conf # [global] # turn on debugging #debug = yes # request a cached login if possible # (needs "winbind offline logon = yes" in smb.conf) cached_login = yes # authenticate using kerberos krb5_auth = yes # when using kerberos, request a "FILE" krb5 credential cache type # (leave empty to just do krb5 authentication but not have a ticket # afterwards) ;krb5_ccache_type = FILE # make successful authentication dependend on membership of one SID # (can also take a name) ;require_membership_of =