Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Lightspeed
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Lightspeed
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHEA-2011:1003 - Product Enhancement Advisory
Issued:
2011-07-21
Updated:
2011-07-21

RHEA-2011:1003 - Product Enhancement Advisory

  • Overview
  • Updated Packages

Synopsis

authconfig enhancement update

Type/Severity

Product Enhancement Advisory

Red Hat Lightspeed patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated authconfig packages that add an enhancement are now available for Red
Hat Enterprise Linux 5.

Description

The authconfig packages contain a program with both a command line and a GUI
interface for configuring a system to use shadow passwords, or to function as a
client for certain network user-information and authentication schemes.

This update adds the following enhancement:

  • This update adds the new '--enablesssd' and '--enablesssdauth' command line

switches. These options allow administrators to configure the nsswitch.conf and
system-auth configuration files so that the System Security Services Daemon
(SSSD) is used for account database lookups and authentication. Note, that
configuration of the SSSD itself is not handled by authconfig and must be done
by other means. (BZ#629021)

All authconfig users are advised to upgrade to these updated authconfig
packages, which add this enhancement.

Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/kb/docs/DOC-11259/

Affected Products

  • Red Hat Enterprise Linux Server 5 x86_64
  • Red Hat Enterprise Linux Server 5 ia64
  • Red Hat Enterprise Linux Server 5 i386
  • Red Hat Enterprise Linux Workstation 5 x86_64
  • Red Hat Enterprise Linux Workstation 5 i386
  • Red Hat Enterprise Linux Desktop 5 x86_64
  • Red Hat Enterprise Linux Desktop 5 i386
  • Red Hat Enterprise Linux for IBM z Systems 5 s390x
  • Red Hat Enterprise Linux for Power, big endian 5 ppc
  • Red Hat Enterprise Linux Server from RHUI 5 x86_64
  • Red Hat Enterprise Linux Server from RHUI 5 i386

Fixes

  • BZ - 629021 - RFE: add support for configuring sssd

CVEs

(none)

References

(none)

Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server 5

SRPM
authconfig-5.3.21-7.el5.src.rpm SHA-256: 04b35b00d74682dea0c1772166dd357069776611a679e8d57a0451ca30bd8b8d
x86_64
authconfig-5.3.21-7.el5.x86_64.rpm SHA-256: b14994c3a2b4ceffb585f1862e4ccdb707f483ee955ea9af37d43522f4e96869
authconfig-gtk-5.3.21-7.el5.x86_64.rpm SHA-256: 5dd617071d7b7bddc34dd11b83cfd6a1526019b7127122425109013b3310c300
ia64
authconfig-5.3.21-7.el5.ia64.rpm SHA-256: 97d100db4862e41fa4cb889ef2c9912f9ae8f4c40f981275c30493c592ff3911
authconfig-gtk-5.3.21-7.el5.ia64.rpm SHA-256: 5732f536553a5436872a6efe171f48305b90c262d7a0fa30b372a87a891ec804
i386
authconfig-5.3.21-7.el5.i386.rpm SHA-256: 774b34aa99c05d2251d0e7c8df202c0d840836dba61d13f78dc640a6c2b55e94
authconfig-gtk-5.3.21-7.el5.i386.rpm SHA-256: bde9ab087a0c1e8ded6a73cac83cc1c153a3080aed77875fc27b8483f185c2ef

Red Hat Enterprise Linux Workstation 5

SRPM
authconfig-5.3.21-7.el5.src.rpm SHA-256: 04b35b00d74682dea0c1772166dd357069776611a679e8d57a0451ca30bd8b8d
x86_64
authconfig-5.3.21-7.el5.x86_64.rpm SHA-256: b14994c3a2b4ceffb585f1862e4ccdb707f483ee955ea9af37d43522f4e96869
authconfig-gtk-5.3.21-7.el5.x86_64.rpm SHA-256: 5dd617071d7b7bddc34dd11b83cfd6a1526019b7127122425109013b3310c300
i386
authconfig-5.3.21-7.el5.i386.rpm SHA-256: 774b34aa99c05d2251d0e7c8df202c0d840836dba61d13f78dc640a6c2b55e94
authconfig-gtk-5.3.21-7.el5.i386.rpm SHA-256: bde9ab087a0c1e8ded6a73cac83cc1c153a3080aed77875fc27b8483f185c2ef

Red Hat Enterprise Linux Desktop 5

SRPM
authconfig-5.3.21-7.el5.src.rpm SHA-256: 04b35b00d74682dea0c1772166dd357069776611a679e8d57a0451ca30bd8b8d
x86_64
authconfig-5.3.21-7.el5.x86_64.rpm SHA-256: b14994c3a2b4ceffb585f1862e4ccdb707f483ee955ea9af37d43522f4e96869
authconfig-gtk-5.3.21-7.el5.x86_64.rpm SHA-256: 5dd617071d7b7bddc34dd11b83cfd6a1526019b7127122425109013b3310c300
i386
authconfig-5.3.21-7.el5.i386.rpm SHA-256: 774b34aa99c05d2251d0e7c8df202c0d840836dba61d13f78dc640a6c2b55e94
authconfig-gtk-5.3.21-7.el5.i386.rpm SHA-256: bde9ab087a0c1e8ded6a73cac83cc1c153a3080aed77875fc27b8483f185c2ef

Red Hat Enterprise Linux for IBM z Systems 5

SRPM
authconfig-5.3.21-7.el5.src.rpm SHA-256: 04b35b00d74682dea0c1772166dd357069776611a679e8d57a0451ca30bd8b8d
s390x
authconfig-5.3.21-7.el5.s390x.rpm SHA-256: 0ba0f3df757a6824d5c2d540b7c5ab4cc41cdfc0670ac68cf5a852c609096f5e
authconfig-gtk-5.3.21-7.el5.s390x.rpm SHA-256: 9e5631ea2b197c3fe07b947638cd06541e72c8824cb9654665713a231f1e1719

Red Hat Enterprise Linux for Power, big endian 5

SRPM
authconfig-5.3.21-7.el5.src.rpm SHA-256: 04b35b00d74682dea0c1772166dd357069776611a679e8d57a0451ca30bd8b8d
ppc
authconfig-5.3.21-7.el5.ppc.rpm SHA-256: c2c2f29cff36c4ebc1ebda1f2f3273dc04982fd4b97000e7c5b0f75be7c0f640
authconfig-gtk-5.3.21-7.el5.ppc.rpm SHA-256: e87410ec09ed69055daf6bb8157c4d1762619bae96f65644bcb7124a7b90c9a9

Red Hat Enterprise Linux Server from RHUI 5

SRPM
authconfig-5.3.21-7.el5.src.rpm SHA-256: 04b35b00d74682dea0c1772166dd357069776611a679e8d57a0451ca30bd8b8d
x86_64
authconfig-5.3.21-7.el5.x86_64.rpm SHA-256: b14994c3a2b4ceffb585f1862e4ccdb707f483ee955ea9af37d43522f4e96869
authconfig-gtk-5.3.21-7.el5.x86_64.rpm SHA-256: 5dd617071d7b7bddc34dd11b83cfd6a1526019b7127122425109013b3310c300
i386
authconfig-5.3.21-7.el5.i386.rpm SHA-256: 774b34aa99c05d2251d0e7c8df202c0d840836dba61d13f78dc640a6c2b55e94
authconfig-gtk-5.3.21-7.el5.i386.rpm SHA-256: bde9ab087a0c1e8ded6a73cac83cc1c153a3080aed77875fc27b8483f185c2ef

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility