Configuring PAM

Describes how PAM works with MapR.

MapR uses Pluggable Authentication Modules (PAM) for password verification in a variety of places. Make sure PAM is installed and configured on the node running the mapr-apiserver and other components that will use PAM to verify passwords.

Several PAM modules (profiles), configurable through configuration files in the /etc/pam.d/ directory, are typically available. Any component verifying user passwords tries the following three profiles in order:

  1. sudo (/etc/pam.d/sudo)
  2. sshd (/etc/pam.d/sshd)
  3. mapr-admin (if you created the /etc/pam.d/mapr-admin profile and the component checks beyond the first two profiles).
auth    sufficient      pam_unix.so  # For local OS Auth

Component-specific PAM Configurations

Some ecosystem components have unique requirements that require setup of a component-specific PAM configuration. See the Ecosystem Guide for the specific ecosystem component.