From 6b8bd0a45c79d8f468f50798f855e75f8e28a6ab Mon Sep 17 00:00:00 2001 From: Erich Menge Date: Thu, 21 Nov 2013 10:08:46 -0800 Subject: [PATCH] Updated ChallengeResponse (on Mac OS X) (markdown) --- ChallengeResponse-(on-Mac-OS-X).md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/ChallengeResponse-(on-Mac-OS-X).md b/ChallengeResponse-(on-Mac-OS-X).md index f53d722..7ff5664 100644 --- a/ChallengeResponse-(on-Mac-OS-X).md +++ b/ChallengeResponse-(on-Mac-OS-X).md @@ -59,7 +59,7 @@ where * `module-path` selects the module to be used for this authentication step. This is used as filename in a directory where pam libraries are expected, on OS X e.g. `/usr/lib/pam`, `/usr/lib/security` on some other systems. We want `pam_yubico.so` in this case, which will load `/usr/lib/pam/pam_yubico.so`. * `arguments` are passed to the pam module and can be used to configure its behavior. See "Supported PAM module parameters" in [README](https://github.com/Yubico/yubico-pam/blob/master/README) for a list of possible values. Since we want to use challenge-response, we add `mode=challenge-response` and to debug the setup initially also `debug`, separated by spaces. `debug` can safely be removed later. -**Warning**: If you misconfigure your PAM modules here you might loose your ability to sudo! Always keep a root shell open to be able to revert your changes in case something goes wrong! +**Warning**: If you misconfigure your PAM modules here you might lose your ability to sudo! Always keep a root shell open to be able to revert your changes in case something goes wrong! So, if we wanted to use the YubiKey to allow us to sudo without typing a password, we would add