mirror of
https://github.com/Yubico/yubico-pam.git
synced 2025-02-20 21:54:16 +01:00
Update MacOS_X_Challenge-Response.adoc
This commit is contained in:
parent
499412c6e8
commit
2083c76c23
@ -29,20 +29,19 @@ Personalization Tool" is a more comfortable way to do this.
|
||||
1. Plug in your YubiKey and start the YubiKey Personalization Tool
|
||||
+
|
||||
NOTE: YubiKey Personalization Tool shows whether your YubiKey supports challenge-response in the lower right.
|
||||
2. Click Challenge-Response
|
||||
3. Select HMAC-SHA1 mode
|
||||
Apparently Yubico-OTP mode doesn't work with yubico-pam at the moment.
|
||||
2. Click 'Challenge-Response'
|
||||
3. Select HMAC-SHA1 mode. Apparently Yubico-OTP mode doesn't work with yubico-pam at the moment.
|
||||
4. Select the configuration slot you want to use
|
||||
(this text assumes slot two, but it should be easy enough to adapt the instructions if you prefer slot 1)
|
||||
5. Select whether you want to require pressing the button for authentication
|
||||
+
|
||||
NOTE: If you enable this, you will have to press the button twice for each authentication with yubico-pam. This is because the PAM module does not only send the challenge on file and checks whether the response matches, but also generates a new challenge-response pair on success.
|
||||
6. Use "Variable input" as HMAC-SHA1 mode
|
||||
6. Use 'Variable input' as HMAC-SHA1 mode
|
||||
+
|
||||
WARNING: Using "Fixed 64 byte input" for this value made my YubiKey always return the same response regardless of what the challenge was. Since this defies the purpose of challenge-response think twice and test before you use this!
|
||||
7. Generate a secret key
|
||||
You won't need this key again, it's sufficient to have it on your YubiKey. Note that the YubiKey Personalization Tool by default logs the key to configuration_log.csv in your home directory. Consider turning this off in the settings before writing or shredding the file after writing.
|
||||
8. Click "Write Configuration"
|
||||
8. Click 'Write Configuration'
|
||||
|
||||
=== Configuring your user account to accept the YubiKey ===
|
||||
|
||||
@ -65,8 +64,6 @@ stored the initial challenge somewhere inside your home directory:
|
||||
Stored initial challenge and expected response in '/path/to/your/home/.yubico/challenge-KEYID'.
|
||||
----
|
||||
|
||||
A footnote footnote:[An example footnote.]
|
||||
|
||||
This step will create a file with a challenge and the expected
|
||||
response (that can only be generated with the secret
|
||||
key footnote:[This is also the reason why you should avoid having copies of the key in other places than your YubiKey!] )
|
||||
|
Loading…
x
Reference in New Issue
Block a user