Common log locations
Enable verbose logging
Adddebug = true to /etc/himmelblau/himmelblau.conf and restart both daemons:
Issues
Users can't log in / PAM returns an error
Users can't log in / PAM returns an error
Check that both daemons are running:Check that a domain is configured:The Apply the changes:
domain option must be set. Without it, no users can authenticate.Check pam_allow_groups:If pam_allow_groups is configured, the user must be a member of one of the listed groups. Verify the user’s group membership in Entra ID matches the configured group GUIDs.Inspect the PAM configuration:Run without --really to perform a dry run and see what changes would be applied:getent passwd returns nothing for an Entra ID user
getent passwd returns nothing for an Entra ID user
Check that NSS is configured to use Himmelblau:The Verify nscd is disabled:nscd caches NSS results and will interfere with Himmelblau’s own cache. It must be disabled and masked:If it is running:Test daemon connectivity:
passwd, group, and shadow lines should include himmelblau, for example:MFA prompt doesn't appear / authentication hangs
MFA prompt doesn't appear / authentication hangs
Check network connectivity:Himmelblau must reach Look for connection errors or timeout messages.Run an interactive authentication test:This tests the full authentication path through
login.microsoftonline.com to complete MFA. Verify DNS resolution and outbound HTTPS are working from the host.Check daemon logs for errors:himmelblaud and shows the MFA challenge interactively. It does not test your PAM configuration — only that the daemon can process authentications correctly.Hello PIN not working after setup
Hello PIN not working after setup
Check that Hello is enabled in the configuration:
enable_hello must be true (it is the default). If it was explicitly disabled, re-enable it and restart the daemons.Check the minimum PIN length:The PIN the user set must meet or exceed hello_pin_min_length (default: 6 characters). If the policy was tightened after the PIN was created, the user needs to re-enroll their PIN.Force a full re-authentication:The user can re-authenticate with their password or MFA to re-establish their Hello credentials:--force-reauth bypasses the cached Hello key and requires a full MFA/password challenge, after which a new Hello key is enrolled.Cache is stale / user attributes are wrong
Cache is stale / user attributes are wrong
Mark all cached entries as stale (soft refresh on next use):Clear only the NSS resolution cache:Clear only the mapped name cache:
SELinux AVC denials
SELinux AVC denials
Himmelblau ships a SELinux policy module. If you are seeing AVC denials, first check that the policy module is installed:To diagnose specific denials:If the policy module is missing, reinstall the
himmelblau package for your distribution. If you encounter denials that are not covered by the shipped policy, please report them upstream so the policy can be updated.