1
0
mirror of https://github.com/Yubico/yubico-pam.git synced 2024-12-11 09:24:10 +01:00
yubico-pam/README

124 lines
3.0 KiB
Plaintext
Raw Permalink Normal View History

2008-05-03 10:31:19 +02:00
#summary Installation and configuration of the Yubico PAM module
2008-06-25 15:49:31 +02:00
#labels Featured,Phase-Deploy
2008-05-03 10:31:19 +02:00
= Yubico PAM module =
2008-01-11 13:41:21 +01:00
The Yubico PAM module provides an easy way to integrate the Yubikey
into your existing user authentication infrastructure. PAM is used by
GNU/Linux, Solaris and Mac OS X for user authentication, and by other
2008-05-03 10:31:19 +02:00
specialized applications such as NCSA !MyProxy.
2008-01-11 13:41:21 +01:00
2008-05-03 10:31:19 +02:00
== Status and Roadmap ==
2008-01-11 13:41:21 +01:00
The module is working for single-user systems.
Several items have been identified that needs to be implemented before
it can reach production quality:
2008-06-25 15:49:31 +02:00
* Multi-user mappings from Yubikey to username.
2008-05-03 10:31:19 +02:00
2008-06-25 15:49:31 +02:00
* Support disconnected AES key usage.
2008-01-11 13:41:21 +01:00
2008-01-11 13:52:40 +01:00
The development community is co-ordinated via Google Code:
http://code.google.com/p/yubico-pam/
The license for pam_yubico is the same as for Linux-PAM, namely a
dual-license between 3-clause BSD and the GPL. See the file COPYING
for more information.
2008-05-03 10:31:19 +02:00
== Building from SVN ==
2008-01-11 13:41:21 +01:00
Skip to the next section if you are using an official packaged
version.
2008-01-11 13:52:40 +01:00
You may check out the sources using SVN with the following command:
2008-05-03 10:31:19 +02:00
{{{
2008-01-11 13:52:40 +01:00
svn checkout http://yubico-pam.googlecode.com/svn/trunk/ yubico-pam
2008-05-03 10:31:19 +02:00
}}}
2008-01-11 13:52:40 +01:00
This will create a directory 'yubico-pam'. Enter the directory:
2008-05-03 10:31:19 +02:00
{{{
2008-01-11 13:52:40 +01:00
cd yubico-pam
2008-05-03 10:31:19 +02:00
}}}
2008-01-11 13:52:40 +01:00
2008-05-02 11:23:13 +02:00
Autoconf, automake and libtool must be installed. For the
documentation, asciidoc and docbook are also required.
2008-01-11 13:41:21 +01:00
Generate the build system using:
2008-05-03 10:31:19 +02:00
{{{
2008-01-11 13:41:21 +01:00
autoreconf --install
2008-05-03 10:31:19 +02:00
}}}
2008-01-11 13:41:21 +01:00
2008-05-03 10:31:19 +02:00
== Building ==
2008-01-11 13:41:21 +01:00
2008-06-25 15:49:31 +02:00
You will need to have libyubikey-client (libykclient.h,
libyubikey-client.so) and libpam-dev (security/pam_appl.h, libpam.so)
installed. Get the libyubikey-client library from:
http://code.google.com/p/yubico-c-client/
2008-01-11 13:41:21 +01:00
The build system uses Autoconf, to set up the build system run:
2008-05-03 10:31:19 +02:00
{{{
2008-01-11 13:41:21 +01:00
./configure
2008-05-03 10:31:19 +02:00
}}}
2008-01-11 13:41:21 +01:00
Then build the code, run the self-test and install the binaries:
2008-05-03 10:31:19 +02:00
{{{
2008-01-11 13:41:21 +01:00
make check install
2008-05-03 10:31:19 +02:00
}}}
2008-01-11 13:41:21 +01:00
2008-05-03 10:31:19 +02:00
== Configuration ==
2008-01-11 13:41:21 +01:00
Install it in your PAM setup by adding a line to an appropriate file
in /etc/pam.d/:
2008-05-03 10:31:19 +02:00
{{{
2008-01-11 13:41:21 +01:00
auth sufficient pam_yubico.so id=16 debug
2008-05-03 10:31:19 +02:00
}}}
2008-01-11 13:41:21 +01:00
and move pam_yubico.so into /lib/security/:
2008-01-11 13:41:21 +01:00
2008-05-03 10:31:19 +02:00
{{{
mv /usr/local/lib/security/pam_yubico.so /lib/security/
2008-05-03 10:31:19 +02:00
}}}
2008-01-11 13:41:21 +01:00
Supported PAM module parameters are:
2008-05-03 10:31:19 +02:00
{{{
2008-01-11 13:41:21 +01:00
"id": to indicate your client identity,
"debug": to enable debug output to stdout,
"alwaysok": to enable that all authentication attempts should succeed
(aka presentation mode).
"url": specify the URL template to use, this is set by calling
yubikey_client_set_url_template, which uses by default:
http://api.yubico.com/wsapi/verify?id=%d&otp=%s
2008-05-03 10:31:19 +02:00
}}}
2008-01-11 13:41:21 +01:00
If you are using "debug" you may find it useful to create a
world-writable log file:
2008-05-03 10:31:19 +02:00
{{{
2008-01-11 13:41:21 +01:00
touch /var/run/pam-debug.log
chmod go+w /var/run/pam-debug.log
2008-05-03 10:31:19 +02:00
}}}
2008-01-11 13:41:21 +01:00
2008-06-25 15:49:31 +02:00
== Examples ==
If you want to use the Yubikey to authenticate you on linux console
logins, add the following to the top of /etc/pam.d/login:
{{{
auth sufficient pam_yubico.so id=16 debug
}}}
2008-05-03 10:31:19 +02:00
== Feedback ==
2008-01-11 13:41:21 +01:00
If you want to discuss anything related to the Yubico PAM module,
2008-05-03 10:31:19 +02:00
please contact <simon@yubico.com>.