mirror of
https://github.com/Yubico/yubico-pam.git
synced 2024-11-29 09:24:22 +01:00
updates from yubico-pam README
parent
26cecaa8cd
commit
5ad472914b
@ -177,8 +177,8 @@ Supported PAM module parameters are:
|
||||
respectively.
|
||||
|
||||
"verbose_otp":
|
||||
This argument is used to show the OTP when it is entered,
|
||||
i.e. to enable terminal echo of entered characters.
|
||||
This argument is used to show the OTP (One Time Password) when it
|
||||
is entered, i.e. to enable terminal echo of entered characters.
|
||||
You are advised to not use this, if you are using two factor
|
||||
authentication because that will display your password on the
|
||||
screen.
|
||||
@ -246,8 +246,8 @@ each user you want to allow onto the system using a Yubikey.
|
||||
The mappings should look like this, one per line:
|
||||
|
||||
------
|
||||
<user name>:<Yubikey token ID>:<Yubikey token ID>:….
|
||||
<user name>:<Yubikey token ID>:<Yubikey token ID>:….
|
||||
<first user name>:<Yubikey token ID1>:<Yubikey token ID2>:….
|
||||
<second user name>:<Yubikey token ID3>:<Yubikey token ID4>:….
|
||||
------
|
||||
|
||||
Now add authfile=/etc/yubikey_mappings to your PAM configuration line, so it
|
||||
@ -265,7 +265,7 @@ directory and places the mapping in that file, the file must have only one
|
||||
line:
|
||||
|
||||
------
|
||||
<user name>:<Yubikey token ID>:<Yubikey token ID>
|
||||
<user name>:<Yubikey token ID1>:<Yubikey token ID2>
|
||||
------
|
||||
|
||||
This is much the same concept as the SSH authorized_keys file.
|
||||
@ -274,7 +274,7 @@ This is much the same concept as the SSH authorized_keys file.
|
||||
Obtaining the Yubikey token ID (a.k.a. public ID)
|
||||
-------------------------------------------------
|
||||
You can obtain the Yubikey token ID in two places. One is by removing the
|
||||
last 32 characters of any OTP generated with your Yubikey, the other
|
||||
last 32 characters of any OTP (One Time Password) generated with your Yubikey, the other
|
||||
is by using the modhex calculator located here :
|
||||
|
||||
http://radius.yubico.com/demo/Modhex_Calculator.php
|
||||
@ -283,6 +283,54 @@ Enter your Yubikey OTP and convert it, your Yubikey token ID is 12 digits and li
|
||||
|
||||
Modhex encoded: XXXXXXX
|
||||
|
||||
|
||||
Not sure what that last bit meant? Here is how to get a copy of your OTP.
|
||||
|
||||
Fast way
|
||||
========
|
||||
* Open a terminal
|
||||
* Press yubikey button
|
||||
|
||||
It will output an OTP into the shell:
|
||||
|
||||
------
|
||||
$ cccccccgklgcvnkcvnnegrnhgrjkhlkfhdkclfncvlgj
|
||||
bash: cccccccgklgcvnkcvnnegrnhgrjkhlkfhdkclfncvlgj: command not found
|
||||
------
|
||||
|
||||
This can be pasted into the Modhex_Calculator page.
|
||||
|
||||
Harder way
|
||||
==========
|
||||
This requires you to have the pam module enabled with 'debug' turned on. When
|
||||
prompted for the yubikey press the button. The pam module will print out debug
|
||||
information including the OTP and ID of your token to the shell - copy the ID
|
||||
into your config file and you should be up and going.
|
||||
|
||||
------
|
||||
Yubikey for `youruser':
|
||||
[pam_yubico.c:pam_sm_authenticate(867)] conv returned 44 bytes
|
||||
[pam_yubico.c:pam_sm_authenticate(885)] Skipping first 0 bytes. Length is 44, token_id set to 12 and token OTP always 32.
|
||||
[pam_yubico.c:pam_sm_authenticate(892)] OTP: ccccccclabcabkhbdncicglfltnukadfoifadfhhhhfe ID: cccccclabcab
|
||||
------
|
||||
|
||||
|
||||
Yubico PAM module and SELinux.
|
||||
------------------------------
|
||||
Users with SELinux in enforcing mode (the default on Fedora 17+) may experience
|
||||
login problems with services including those validated via
|
||||
polkit-agent-helper-1, sshd and login.
|
||||
|
||||
This is documented in the PAM Yubico issue tracker [1] and Red Hat bugzilla
|
||||
including a work around [2] for ssh (Equivalent files could be created for
|
||||
other services). Systems in 'permissive' mode will generate AVC warnings but
|
||||
authentication will succeed.
|
||||
|
||||
[1] http://code.google.com/p/yubico-pam/issues/detail?id=43
|
||||
[2] https://bugzilla.redhat.com/show_bug.cgi?id=841693#c3
|
||||
|
||||
To determine if you have SELinux enforcing or not run the 'sestatus' command.
|
||||
|
||||
Examples
|
||||
--------
|
||||
|
||||
|
Loading…
Reference in New Issue
Block a user