mirror of
https://github.com/Yubico/yubico-pam.git
synced 2024-12-01 15:24:12 +01:00
35 lines
1.5 KiB
Plaintext
35 lines
1.5 KiB
Plaintext
PAM configuration is somewhat complex, but a typical use-case is to
|
|
require both a password and YubiKey to allow access. This can be
|
|
achieved by a PAM configuration like this:
|
|
|
|
----
|
|
auth requisite pam_yubico.so id=42
|
|
auth required pam_unix.so use_first_pass
|
|
----
|
|
|
|
The first line makes pam_yubico check the OTP. Use either a per-user
|
|
file called `~/.yubico/authorized_yubikeys`, or a system-wide file called
|
|
`/etc/yubikey_mappings` to specify which YubiKeys that can be used to log
|
|
in as specific users. See https://developers.yubico.com/yubico-pam[the README]
|
|
for more information.
|
|
|
|
The 'use_first_pass' on the next line says that the password the pam_unix
|
|
module should check should be received from the earlier PAM modules
|
|
and that the module should not query for passwords.
|
|
|
|
Of course, if you use username/password verification from a SQL
|
|
database or LDAP, you need to change the second line above. But the
|
|
module you use needs to support 'use_first_pass' for this to work.
|
|
Most modules support this.
|
|
|
|
Be sure to comment out any other 'auth' lines in your PAM configuration,
|
|
unless you want those. For example, Debian contains a
|
|
'@include common-auth' which would confuse the configuration.
|
|
|
|
To log in, you now need to enter both your Unix password and enter an
|
|
OTP using your YubiKey. When prompted for the password, enter the Unix
|
|
password first and then (without pressing enter) push the button on your
|
|
YubiKey.
|
|
|
|
If it doesn't work, enable debugging (see https://developers.yubico.com/yubico-pam[the README]) and try again.
|