Installing and Setup
(windows) g_authent_process "c:\surgemail\nwauth.exe -path c:\surgemail"
(linux) g_authent_process "./nwauth"
Optional Command Line Options:
-path | Tells NWAuth where to create it's logfile and where to find it's config file. |
-debug | Sets the logging level to debug. |
-log | turns on logging to nwauth.log. |
-logpass | testing option, log full command as given (includes password!) |
-readonly | Use on slaves that don't need to update files. |
-encrypt user/all | |
-generate n | Creates accounters test0..testn passwords test. |
-size x | Sets max size of nwauth.add. |
-sleep x y | Testing option, sleep for y seconds first and every xth response |
drop_path <hash> <base> | Testing option, give drop path using DPOP hashing, hash=0,1,2, base is common drop path |
-badchar <string> | Overrides default bad character list with the string |
-badchar_localpart <string> | Overrides default localpart (before the @) bad character list with the string |
-allowats | Disables check for more than one '@' symbol in username |
-allowhighascii | Disables check for high and low ascii in username |
-nocrypt | Store passwords as plain text (security risk) |
-decrypt | Decrypt passwords as users login. (security risk) |
-showpass | Show password on lookups (security risk!) |
Error recovery - recover lost users.
In the event of loosing some users from the database for any unknown reason (deleting a file manually etc) you can rebuild the user database like this using the journal entries it keeps.
# First copy nwauth.* files
mkdir backup
copy nwauth.* backup
# Then use this command to get a list of changes it will make:
nwauth -path . -test
# Then run it with -fix to actually add the missing users:
nwauth -path . -fix
Supported Commands
The commands below are the list of commands that this module supports.
Command | Parameters |
---|---|
check | <user> <pass> |
lookup | <user> |
set | <user> <pass>|(NULL) [label="value"] |
del | <user> |
search | <string> [-from n] [-max m] |
help | |
quit | |
exit |
To make passwords visible in admin
Obviously this is not recommended as it is a security risk, but on a small or home server this may be worth doing:
Use these two settings
g_authent_process "c:\surgemail\nwauth.exe -path c:\surgemail -nocrypt -decrypt -showpass"
g_authent_info name="Password" field="password" access="admin" default="" type=""