#1142 SSSD should have an option to cache PAM logins for a short duration
Closed: Duplicate None Opened 12 years ago by sgallagh.

Under certain high-load situations (such as web or DB applications authenticating against SSSD), it would make sense to be able to use the cached credentials rather than go to the network server.

This would significantly improve performance for such applications.


To elaborate a bit further, the idea would be to have a short period (say 5 minutes) within which any auth attempt after the first one would hit the cached credentials instead of the remote auth server.

This has to be constrained only to specific high traffic services, so needs to be an option passed down from libpam_sss into sssd_pam.

Fields changed

milestone: NEEDS_TRIAGE => SSSD 1.9.x Infopipe

Fields changed

rhbz: => 0

This was implemented as ticket #2697.

changelog: =>
design: =>
design_review: => 0
feature_milestone: =>
fedora_test_page: =>
mark: => 0
resolution: => duplicate
review: => 0
selected: =>
sensitive: => 0
status: new => closed

Metadata Update from @sgallagh:
- Issue set to the milestone: SSSD Infopipe Feature

7 years ago

SSSD is moving from Pagure to Github. This means that new issues and pull requests
will be accepted only in SSSD's github repository.

This issue has been cloned to Github and is available here:
- https://github.com/SSSD/sssd/issues/2184

If you want to receive further updates on the issue, please navigate to the github issue
and click on subscribe button.

Thank you for understanding. We apologize for all inconvenience.

Login to comment on this ticket.

Metadata