Homepage > Man Pages > Category > Maintenance Commands
Homepage > Man Pages > Name > P

pam_duo

man page of pam_duo

pam_duo: PAM module for Duo authentication

NAME

pam_duo - PAM module for Duo authentication
SYNOPSIS
pam_duo.so [conf=<FILENAME>]
DESCRIPTION
pam_duo provides secondary authentication (typically after successful password-based authentication) through the Duo authentication service.

OPTIONS

Only one PAM module configuration option is supported: conf Specify an alternate configuration file to load.

CONFIGURATION

The INI-format configuration file must have a ''duo'' section with the following options: ikey Duo integration key (required). skey Duo secret key (required). group Skip Duo authentication for users not in a specific Unix group. minuid Skip Duo authentication for users below a specified user ID. failmode On service or configuration errors that prevent Duo authentication, fail ''safe'' (allow access) or ''secure'' (deny access). Default is ''safe''. host Override Duo API host for debugging. An example configuration file: [duo] ikey=SI9F...53RI skey=4MjR...Q2NmRiM2Q1Y minuid=500 Other authentication restrictions may be implemented using pam_listfile(8), pam_access(8), etc.

FILES

/etc/duo/pam_duo.conf Default configuration file path

AUTHORS

pam_duo was written by Duo Security <duo_unix@duosecurity.com>
NOTES
When used with OpenSSH's sshd(8), only PAM-based authentication can be protected with this module; pubkey authentication bypasses PAM entirely. OpenSSH's PAM integration also does not honor an interactive pam_conv(3) conversation, prohibiting real-time Duo status messages (such as during voice callback). PAM_DUO(8)
 
 
 

Copyright © 2011–2018 by topics-of-interest.com . All rights reserved. Hosted by all-inkl.
Contact · Imprint · Privacy

Page generated in 21.47ms.

doomsdaydude.com | dfptutorial.com | information-information.de