1
0
mirror of https://github.com/Yubico/yubico-pam.git synced 2025-02-27 15:54:15 +01:00

fix links

Klas Lindfors 2013-09-20 13:09:44 +02:00
parent 2354519ccc
commit e19465bc84
2 changed files with 4 additions and 4 deletions

@ -10,7 +10,7 @@ achieved by a PAM configuration like this:
The first line makes pam_yubico check the OTP. Use either a per-user
file called ~/.yubico/authorized_yubikeys, or a system wide file called
/etc/yubikey_mappings to specify which Yubikeys that can be used to log
in as specific users. See the [[ReadMe]] file for more details about this.
in as specific users. See the https://github.com/Yubico/yubico-pam/wiki/ReadMe for more details about this.
The "use_first_pass" on the next line says that the password the pam_unix
module should check should be received from the earlier PAM modules
@ -30,4 +30,4 @@ OTP using your Yubikey. When prompted for the password, enter the Unix
password first and then (without pressing enter) push the button on your
Yubikey.
If it doesn't work, enable debugging (see [[ReadMe]]) and try again.
If it doesn't work, enable debugging (see https://github.com/Yubico/yubico-pam/wiki/ReadMe) and try again.

@ -64,7 +64,7 @@ b) Installation of pam_yubico module:
Build instructions for pam_yubico are available in the README:
[[ReadMe]]
https://github.com/Yubico/yubico-pam/wiki/ReadMe
c) Configuration of pam_yubico module:
--------------------------------------
@ -237,7 +237,7 @@ To configure OpenVPN with FreeRADIUS support, please follow the steps below:
* Install and configure FreeRADIUS server for two factor authentication using following wiki link:
[[YubiKeyAndFreeRADIUSviaPAM]]
https://github.com/Yubico/yubico-pam/wiki/YubiKeyAndFreeRADIUSviaPAM
* Install and configure pam_radius_auth.so and copy it to /lib/security directory