mirror of
https://github.com/Yubico/yubico-pam.git
synced 2024-12-01 15:24:12 +01:00
189 lines
5.4 KiB
Plaintext
189 lines
5.4 KiB
Plaintext
#summary Installation and configuration of the Yubico PAM module
|
||
#labels Featured,Phase-Deploy
|
||
|
||
= Yubico PAM module =
|
||
|
||
The Yubico PAM module provides an easy way to integrate the Yubikey
|
||
into your existing user authentication infrastructure. PAM is used by
|
||
GNU/Linux, Solaris and Mac OS X for user authentication, and by other
|
||
specialized applications such as NCSA !MyProxy.
|
||
|
||
== Status and Roadmap ==
|
||
|
||
The module is working for multi-user systems. It does not support
|
||
disconnected mode, for that there is another Yubico PAM module that
|
||
uses the AES key.
|
||
|
||
The development community is co-ordinated via Google Code:
|
||
|
||
http://code.google.com/p/yubico-pam/
|
||
|
||
The license for pam_yubico is the 2-clause BSD license, which is
|
||
compatible with the Linux-PAM BSD/GPL license. See the file COPYING
|
||
for more information.
|
||
|
||
== Building from SVN ==
|
||
|
||
Skip to the next section if you are using an official packaged
|
||
version.
|
||
|
||
You may check out the sources using SVN with the following command:
|
||
|
||
{{{
|
||
svn checkout http://yubico-pam.googlecode.com/svn/trunk/ yubico-pam
|
||
}}}
|
||
|
||
This will create a directory 'yubico-pam'. Enter the directory:
|
||
|
||
{{{
|
||
cd yubico-pam
|
||
}}}
|
||
|
||
Autoconf, automake and libtool must be installed.
|
||
|
||
Generate the build system using:
|
||
|
||
{{{
|
||
autoreconf --install
|
||
}}}
|
||
|
||
== Building ==
|
||
|
||
You will need to have libykclient (ykclient.h, libykclient.so) and
|
||
libpam-dev (security/pam_appl.h, libpam.so) installed. Get the
|
||
ykclient library from:
|
||
|
||
http://code.google.com/p/yubico-c-client/
|
||
|
||
It in turn requires Curl, which you need to have installed.
|
||
|
||
The build system uses Autoconf, to set up the build system run:
|
||
|
||
{{{
|
||
./configure
|
||
}}}
|
||
|
||
Use --without-ldap to disable ldap support.
|
||
|
||
Then build the code, run the self-test and install the binaries:
|
||
|
||
{{{
|
||
make check install
|
||
}}}
|
||
|
||
== Configuration ==
|
||
|
||
Install it in your PAM setup by adding a line to an appropriate file
|
||
in /etc/pam.d/:
|
||
|
||
{{{
|
||
auth sufficient pam_yubico.so id=16 debug
|
||
}}}
|
||
|
||
and move pam_yubico.so into /lib/security/:
|
||
|
||
{{{
|
||
mv /usr/local/lib/security/pam_yubico.so /lib/security/
|
||
}}}
|
||
|
||
For more information, see the project Wiki page.
|
||
|
||
Supported PAM module parameters are:
|
||
|
||
{{{
|
||
"authfile": to indicate the location of the file that holds the
|
||
mappings of yubikey public IDs to user names.
|
||
|
||
"id": to indicate your client identity.
|
||
|
||
"key": to indicate your client key in base64 format.
|
||
|
||
"debug": to enable debug output to stdout.
|
||
|
||
"alwaysok": to enable all authentication attempts to succeed
|
||
(aka presentation mode).
|
||
|
||
"try_first_pass":
|
||
Before prompting the user for their password, the module first
|
||
tries the previous stacked module´s password in case that satisfies
|
||
this module as well.
|
||
|
||
"use_first_pass":
|
||
The argument use_first_pass forces the module to use a previous
|
||
stacked modules password and will never prompt the user - if no
|
||
password is available or the password is not appropriate, the user
|
||
will be denied access.
|
||
|
||
"url": specify the URL template to use, this is set by calling
|
||
yubikey_client_set_url_template, which defaults to:
|
||
http://api.yubico.com/wsapi/verify?id=%d&otp=%s
|
||
|
||
"ldap_uri": specifiy the ldap server uri (e.g. ldap://localhost).
|
||
|
||
|
||
"ldapserver": specifiy the ldap server host (default ldap port is used).
|
||
Deprecated. Use "ldap_uri" instead.
|
||
|
||
"ldapdn": specify the dn where the users are stored
|
||
(eg: ou=users,dc=domain,dc=com).
|
||
|
||
"user_attr": specify the LDAP attribute used to store user names (eg:cn).
|
||
|
||
"yubi_attr": specify the LDAP attribute used to store the yubikey id.
|
||
}}}
|
||
|
||
If you are using "debug" you may find it useful to create a
|
||
world-writable log file:
|
||
|
||
{{{
|
||
touch /var/run/pam-debug.log
|
||
chmod go+w /var/run/pam-debug.log
|
||
}}}
|
||
|
||
== Authorization Mapping Files ==
|
||
A mapping must be made between the yubikey public ID and the user it ID is
|
||
attached to. There are two ways to do this, either centrally in one file or
|
||
individually, where users can create the mapping in their home directories.
|
||
If the central authorization mapping file is being used, user home directory
|
||
mappings will not be used and the opposite applies if user home directory
|
||
mappings are being used, the central authorization mappings file will not
|
||
be used.
|
||
|
||
1) Centrally
|
||
|
||
Create a /etc/yubikey_mappings, the file must contain a user name and the
|
||
yubikey Public ID separated by colons (same format at the passwd file) for
|
||
each user you want to allow onto the system using a yubikey.
|
||
|
||
The mappings should look like this, one per line:
|
||
<user name>:<yubikey token ID>:<yubikey token ID>: ….
|
||
<user name>:<yubikey token ID>:<yubikey token ID>:…..
|
||
|
||
Now add authfile=/etc/yubikey_mappings to your PAM configuration line, so it
|
||
looks like:
|
||
|
||
auth sufficient pam_yubico.so id=16 authfile=/etc/yubikey_mappings
|
||
|
||
2) Individual, by user
|
||
Each user creates a ~/.yubico/authorized_yubikeys file inside of their home
|
||
directory and places the mapping in that file, the file must have only one
|
||
line:
|
||
|
||
<user name>:<yubikey token ID>:<yubikey token ID>
|
||
|
||
This is much the same concept as the SSH authorized_keys file.
|
||
|
||
== Examples ==
|
||
|
||
If you want to use the Yubikey to authenticate you on linux console
|
||
logins, add the following to the top of /etc/pam.d/login:
|
||
|
||
{{{
|
||
auth sufficient pam_yubico.so id=16 debug
|
||
}}}
|
||
|
||
== Feedback ==
|
||
|
||
If you want to discuss anything related to the Yubico PAM module,
|
||
please contact Simon Josefsson <simon@yubico.com>.
|