2014-06-11 13:33:34 +02:00
YKPAMCFG(1)
=========
:doctype: manpage
:man source: yubico-pam
:man manual: Yubico PAM Module Manual
== NAME
ykpamcfg - Manage user settings for the Yubico PAM module
== SYNOPSIS
2020-03-22 09:28:39 +01:00
*ykpamcfg* [-1 | -2] [-A] [-p] [-i] [-v] [-V] [-h]
2014-06-11 13:33:34 +02:00
== OPTIONS
*-1*::
2018-05-02 14:31:22 +02:00
Use slot 1. This is the default.
2014-06-11 13:33:34 +02:00
*-2*::
2018-05-02 14:31:22 +02:00
Use slot 2.
2014-06-11 13:33:34 +02:00
*-A* _action_::
2018-05-02 14:31:22 +02:00
Choose action to perform. See ACTIONS below.
2014-06-11 13:33:34 +02:00
*-p* _path_::
2018-05-02 14:31:22 +02:00
Specify output file, default is `~/.yubico/challenge`.
2014-06-11 13:33:34 +02:00
*-i* _iterations_::
2018-05-02 14:31:22 +02:00
Number of iterations to use for PBKDF2 of expected response.
2014-06-11 13:33:34 +02:00
*-v*::
2018-05-02 14:31:22 +02:00
Enable verbose mode.
2014-06-11 13:33:34 +02:00
2015-02-12 13:33:42 +01:00
*-V*::
2018-05-02 14:31:22 +02:00
Display version and exit.
2015-02-12 13:33:42 +01:00
*-h*::
2018-05-02 14:31:22 +02:00
Display help and exit.
2015-02-12 13:33:42 +01:00
2014-06-11 13:33:34 +02:00
== ACTIONS
=== add_hmac_chalresp
2018-05-02 14:31:22 +02:00
The PAM module can utilize the HMAC-SHA1 Challenge-response (C/R) mode found in YubiKeys starting with version 2.2 for *offline authentication*. This action creates the initial state information with the C/R to be issued at the next logon.
2014-06-11 13:33:34 +02:00
2018-05-02 14:31:22 +02:00
The utility currently outputs the state information to a file in the current user's home directory (`~/.yubico/challenge-123456` for a YubiKey with serial number API readout enabled, and `~/.yubico/challenge` for one without).
2014-06-11 13:33:34 +02:00
2018-05-02 14:31:22 +02:00
The PAM module supports a system-wide directory for these state files (in case the user's home directories are encrypted), but in a system-wide directory, the 'challenge' part should be replaced with the username. Example: /var/yubico/challenges/alice-123456
2014-06-11 13:33:34 +02:00
To use the system-wide mode, you currently have to move the generated state files manually and configure the PAM module accordingly.
== EXAMPLES
2018-05-02 14:31:22 +02:00
First, program a YubiKey for challenge-response on slot 2:
2014-06-11 13:33:34 +02:00
$ ykpersonalize -2 -ochal-resp -ochal-hmac -ohmac-lt64 -oserial-api-visible
...
Commit? (y/n) [n]: y
2018-05-02 14:31:22 +02:00
Now, set the current user to require this YubiKey for logon:
2014-06-11 13:33:34 +02:00
$ ykpamcfg -2 -v
...
Stored initial challenge and expected response in '/home/alice/.yubico/challenge-123456'.
2018-05-02 14:31:22 +02:00
Then, configure authentication with PAM for example like this (_make a backup first_):
2014-06-11 13:33:34 +02:00
2018-05-02 14:31:22 +02:00
_/etc/pam.d/common-auth_ (from Ubuntu 10.10):
2014-06-11 13:33:34 +02:00
auth required pam_unix.so nullok_secure try_first_pass
auth [success=1 new_authtok_reqd=ok ignore=ignore default=die] pam_yubico.so mode=challenge-response
auth requisite pam_deny.so
auth required pam_permit.so
auth optional pam_ecryptfs.so unwrap
== BUGS
Report ykpamcfg bugs in the issue tracker: https://github.com/Yubico/yubico-pam/issues
== SEE ALSO
*pam_yubico*(8)
The yubico-pam home page: https://developers.yubico.com/yubico-pam/
YubiKeys can be obtained from Yubico: http://www.yubico.com/