2008-05-03 08:31:19 +00:00
|
|
|
|
#summary Installation and configuration of the Yubico PAM module
|
2008-06-25 13:49:31 +00:00
|
|
|
|
#labels Featured,Phase-Deploy
|
2008-05-03 08:31:19 +00:00
|
|
|
|
|
|
|
|
|
= Yubico PAM module =
|
2008-01-11 12:41:21 +00:00
|
|
|
|
|
|
|
|
|
The Yubico PAM module provides an easy way to integrate the Yubikey
|
|
|
|
|
into your existing user authentication infrastructure. PAM is used by
|
|
|
|
|
GNU/Linux, Solaris and Mac OS X for user authentication, and by other
|
2008-05-03 08:31:19 +00:00
|
|
|
|
specialized applications such as NCSA !MyProxy.
|
2008-01-11 12:41:21 +00:00
|
|
|
|
|
2008-05-03 08:31:19 +00:00
|
|
|
|
== Status and Roadmap ==
|
2008-01-11 12:41:21 +00:00
|
|
|
|
|
2009-01-13 14:11:09 +00:00
|
|
|
|
The module is working for multi-user systems. It does not support
|
|
|
|
|
disconnected mode, for that there is another Yubico PAM module that
|
|
|
|
|
uses the AES key.
|
2008-01-11 12:41:21 +00:00
|
|
|
|
|
2008-01-11 12:52:40 +00:00
|
|
|
|
The development community is co-ordinated via Google Code:
|
|
|
|
|
|
|
|
|
|
http://code.google.com/p/yubico-pam/
|
|
|
|
|
|
2009-01-13 14:08:21 +00:00
|
|
|
|
The license for pam_yubico is the 2-clause BSD license, which is
|
|
|
|
|
compatible with the Linux-PAM BSD/GPL license. See the file COPYING
|
2008-01-11 12:52:40 +00:00
|
|
|
|
for more information.
|
|
|
|
|
|
2008-05-03 08:31:19 +00:00
|
|
|
|
== Building from SVN ==
|
2008-01-11 12:41:21 +00:00
|
|
|
|
|
|
|
|
|
Skip to the next section if you are using an official packaged
|
|
|
|
|
version.
|
|
|
|
|
|
2008-01-11 12:52:40 +00:00
|
|
|
|
You may check out the sources using SVN with the following command:
|
|
|
|
|
|
2008-05-03 08:31:19 +00:00
|
|
|
|
{{{
|
2008-01-11 12:52:40 +00:00
|
|
|
|
svn checkout http://yubico-pam.googlecode.com/svn/trunk/ yubico-pam
|
2008-05-03 08:31:19 +00:00
|
|
|
|
}}}
|
2008-01-11 12:52:40 +00:00
|
|
|
|
|
|
|
|
|
This will create a directory 'yubico-pam'. Enter the directory:
|
|
|
|
|
|
2008-05-03 08:31:19 +00:00
|
|
|
|
{{{
|
2008-01-11 12:52:40 +00:00
|
|
|
|
cd yubico-pam
|
2008-05-03 08:31:19 +00:00
|
|
|
|
}}}
|
2008-01-11 12:52:40 +00:00
|
|
|
|
|
2009-03-31 14:00:31 +00:00
|
|
|
|
Autoconf, automake and libtool must be installed.
|
2008-01-11 12:41:21 +00:00
|
|
|
|
|
|
|
|
|
Generate the build system using:
|
|
|
|
|
|
2008-05-03 08:31:19 +00:00
|
|
|
|
{{{
|
2008-01-11 12:41:21 +00:00
|
|
|
|
autoreconf --install
|
2008-05-03 08:31:19 +00:00
|
|
|
|
}}}
|
2008-01-11 12:41:21 +00:00
|
|
|
|
|
2008-05-03 08:31:19 +00:00
|
|
|
|
== Building ==
|
2008-01-11 12:41:21 +00:00
|
|
|
|
|
2009-03-25 10:15:13 +00:00
|
|
|
|
You will need to have libykclient (ykclient.h, libykclient.so) and
|
|
|
|
|
libpam-dev (security/pam_appl.h, libpam.so) installed. Get the
|
|
|
|
|
ykclient library from:
|
2008-06-25 13:49:31 +00:00
|
|
|
|
|
|
|
|
|
http://code.google.com/p/yubico-c-client/
|
2008-01-11 12:41:21 +00:00
|
|
|
|
|
2009-03-24 18:33:28 +00:00
|
|
|
|
It in turn requires Curl, which you need to have installed.
|
|
|
|
|
|
2008-01-11 12:41:21 +00:00
|
|
|
|
The build system uses Autoconf, to set up the build system run:
|
|
|
|
|
|
2008-05-03 08:31:19 +00:00
|
|
|
|
{{{
|
2008-01-11 12:41:21 +00:00
|
|
|
|
./configure
|
2008-05-03 08:31:19 +00:00
|
|
|
|
}}}
|
2009-03-24 18:32:58 +00:00
|
|
|
|
|
|
|
|
|
Use --without-ldap to disable ldap support.
|
2008-01-11 12:41:21 +00:00
|
|
|
|
|
|
|
|
|
Then build the code, run the self-test and install the binaries:
|
|
|
|
|
|
2008-05-03 08:31:19 +00:00
|
|
|
|
{{{
|
2008-01-11 12:41:21 +00:00
|
|
|
|
make check install
|
2008-05-03 08:31:19 +00:00
|
|
|
|
}}}
|
2008-01-11 12:41:21 +00:00
|
|
|
|
|
2008-05-03 08:31:19 +00:00
|
|
|
|
== Configuration ==
|
2008-01-11 12:41:21 +00:00
|
|
|
|
|
|
|
|
|
Install it in your PAM setup by adding a line to an appropriate file
|
|
|
|
|
in /etc/pam.d/:
|
|
|
|
|
|
2008-05-03 08:31:19 +00:00
|
|
|
|
{{{
|
2008-01-11 12:41:21 +00:00
|
|
|
|
auth sufficient pam_yubico.so id=16 debug
|
2008-05-03 08:31:19 +00:00
|
|
|
|
}}}
|
2008-01-11 12:41:21 +00:00
|
|
|
|
|
2008-05-02 09:24:53 +00:00
|
|
|
|
and move pam_yubico.so into /lib/security/:
|
2008-01-11 12:41:21 +00:00
|
|
|
|
|
2008-05-03 08:31:19 +00:00
|
|
|
|
{{{
|
2008-05-02 09:24:53 +00:00
|
|
|
|
mv /usr/local/lib/security/pam_yubico.so /lib/security/
|
2008-05-03 08:31:19 +00:00
|
|
|
|
}}}
|
2008-01-11 12:41:21 +00:00
|
|
|
|
|
2009-01-13 14:11:09 +00:00
|
|
|
|
For more information, see the project Wiki page.
|
|
|
|
|
|
2008-01-11 12:41:21 +00:00
|
|
|
|
Supported PAM module parameters are:
|
|
|
|
|
|
2008-05-03 08:31:19 +00:00
|
|
|
|
{{{
|
2009-02-11 16:35:29 +00:00
|
|
|
|
"id": to indicate your client identity,
|
|
|
|
|
"debug": to enable debug output to stdout,
|
|
|
|
|
"alwaysok": to enable that all authentication attempts should succeed
|
|
|
|
|
(aka presentation mode).
|
2009-03-24 11:13:57 +00:00
|
|
|
|
|
|
|
|
|
"try_first_pass":
|
|
|
|
|
Before prompting the user for their password, the module first
|
|
|
|
|
tries the previous stacked module´s password in case that satisfies
|
|
|
|
|
this module as well.
|
|
|
|
|
|
|
|
|
|
"use_first_pass":
|
|
|
|
|
The argument use_first_pass forces the module to use a previous
|
|
|
|
|
stacked modules password and will never prompt the user - if no
|
|
|
|
|
password is available or the password is not appropriate, the user
|
|
|
|
|
will be denied access.
|
|
|
|
|
|
2009-02-11 16:35:29 +00:00
|
|
|
|
"url": specify the URL template to use, this is set by calling
|
|
|
|
|
yubikey_client_set_url_template, which uses by default:
|
|
|
|
|
http://api.yubico.com/wsapi/verify?id=%d&otp=%s
|
|
|
|
|
"ldapserver": specifiy the ldap server host (default ldap port is used)
|
|
|
|
|
"ldapdn": specify the dn where the users are stored (eg: ou=users,dc=domain,dc=com)
|
|
|
|
|
"user_attr": specify the attribute used to store usernames (eg:cn)
|
|
|
|
|
"yubi_attr": specify the attribute used to store the yubikey id
|
2008-05-03 08:31:19 +00:00
|
|
|
|
}}}
|
2008-01-11 12:41:21 +00:00
|
|
|
|
|
|
|
|
|
If you are using "debug" you may find it useful to create a
|
|
|
|
|
world-writable log file:
|
|
|
|
|
|
2008-05-03 08:31:19 +00:00
|
|
|
|
{{{
|
2008-01-11 12:41:21 +00:00
|
|
|
|
touch /var/run/pam-debug.log
|
|
|
|
|
chmod go+w /var/run/pam-debug.log
|
2008-05-03 08:31:19 +00:00
|
|
|
|
}}}
|
2008-01-11 12:41:21 +00:00
|
|
|
|
|
2008-06-25 13:49:31 +00:00
|
|
|
|
== Examples ==
|
|
|
|
|
|
|
|
|
|
If you want to use the Yubikey to authenticate you on linux console
|
|
|
|
|
logins, add the following to the top of /etc/pam.d/login:
|
|
|
|
|
|
|
|
|
|
{{{
|
|
|
|
|
auth sufficient pam_yubico.so id=16 debug
|
|
|
|
|
}}}
|
|
|
|
|
|
2008-05-03 08:31:19 +00:00
|
|
|
|
== Feedback ==
|
2008-01-11 12:41:21 +00:00
|
|
|
|
|
|
|
|
|
If you want to discuss anything related to the Yubico PAM module,
|
2009-01-13 14:11:09 +00:00
|
|
|
|
please contact Simon Josefsson <simon@yubico.com>.
|