ykpamcfg man page on DragonFly

Man page or keyword search:  
man Server   44335 pages
apropos Keyword Search (all sections)
Output format
DragonFly logo
[printable version]

ykpamcfg(1)							   ykpamcfg(1)

NAME
       ykpamcfg - Manage user settings for the Yubico PAM module.

SYNOPSIS
       ykpamcfg [-1 | -2] [-A] [-p] [-i] [-v] [-h]

OPTIONS
       -1     use slot 1.  This is the default.

       -2     use slot 2.

       -A action
	      choose action to perform. See ACTIONS below.

       -p path
	      specify output file for, default is ~/.yubico/challenge

       -i iterations
	      number of iterations to use for pbkdf2 of expected response

       -v     enable verbose mode.

ACTIONS
       add_hmac_chalresp
	      The PAM module can utilize the HMAC-SHA1 Challenge-Response mode
	      found in YubiKeys starting with version 2.2 for offline  authen‐
	      tication.	  This	action	creates	 the initial state information
	      with the C/R to be issued at the next logon.

	      The utility currently outputs the state information to a file in
	      the  current  user's  home directory (~/.yubico/challenge-123456
	      for a YubiKey  with  serial  number  API	readout	 enabled,  and
	      ~/.yubico/challenge for one without).

	      The  PAM module supports a system wide directory for these state
	      files (in case the user's home directories are  encrypted),  but
	      in  a  system  wide  directory,  the  'challenge' part should be
	      replaced	with  the  username.   Example	 :   /var/yubico/chal‐
	      lenges/alice-123456.

	      To use the system-wide mode, you currently have to move the gen‐
	      erated state files manually and configure the PAM module accord‐
	      ingly.

EXAMPLE
       First, program a YubiKey for challenge response on Slot 2 :

	      $ ykpersonalize -2 -ochal-resp -ochal-hmac -ohmac-lt64 -oserial-api-visible
	       ...
	      Commit? (y/n) [n]: y
	      $

       Now, set the current user to require this YubiKey for logon :

	      $ ykpamcfg -2 -v
	       ...
	      Stored initial challenge and expected response in '/home/alice/.yubico/challenge-123456'.
	      $

       Then,  configure	 authentication with PAM for example like this (make a
	      backup first) :

       /etc/pam.d/common-auth (from Ubuntu 10.10) :

	      auth required  pam_unix.so nullok_secure try_first_pass
	      auth [success=1 new_authtok_reqd=ok ignore=ignore default=die]   pam_yubico.so mode=challenge-response
	      auth requisite pam_deny.so
	      auth required  pam_permit.so
	      auth optional  pam_ecryptfs.so unwrap

BUGS
       Report ykpamcfg bugs in the issue tracker ⟨https://github.com/Yubico/
       yubico-pam/issues⟩

SEE ALSO
       The yubico-pam home page ⟨https://developers.yubico.com/yubico-pam/⟩

       pam_yubico(8)

       YubiKeys can be obtained from Yubico ⟨https://www.yubico.com/⟩.

yubico-pam			  March 2011			   ykpamcfg(1)
[top]

List of man pages available for DragonFly

Copyright (c) for man pages and the logo by the respective OS vendor.

For those who want to learn more, the polarhome community provides shell access and support.

[legal] [privacy] [GNU] [policy] [cookies] [netiquette] [sponsors] [FAQ]
Tweet
Polarhome, production since 1999.
Member of Polarhome portal.
Based on Fawad Halim's script.
....................................................................
Vote for polarhome
Free Shell Accounts :: the biggest list on the net