Homepage > Man Pages > Category > Maintenance Commands
Homepage > Man Pages > Name > P


man page of pam_duo

pam_duo: PAM module for Duo authentication


pam_duo - PAM module for Duo authentication
pam_duo.so [conf=<FILENAME>]
pam_duo provides secondary authentication (typically after successful password-based authentication) through the Duo authentication service.


Only one PAM module configuration option is supported: conf Specify an alternate configuration file to load.


The INI-format configuration file must have a ''duo'' section with the following options: ikey Duo integration key (required). skey Duo secret key (required). group Skip Duo authentication for users not in a specific Unix group. minuid Skip Duo authentication for users below a specified user ID. failmode On service or configuration errors that prevent Duo authentication, fail ''safe'' (allow access) or ''secure'' (deny access). Default is ''safe''. host Override Duo API host for debugging. An example configuration file: [duo] ikey=SI9F...53RI skey=4MjR...Q2NmRiM2Q1Y minuid=500 Other authentication restrictions may be implemented using pam_listfile(8), pam_access(8), etc.


/etc/duo/pam_duo.conf Default configuration file path


pam_duo was written by Duo Security <duo_unix@duosecurity.com>
When used with OpenSSH's sshd(8), only PAM-based authentication can be protected with this module; pubkey authentication bypasses PAM entirely. OpenSSH's PAM integration also does not honor an interactive pam_conv(3) conversation, prohibiting real-time Duo status messages (such as during voice callback). PAM_DUO(8)

Copyright © 2011–2018 by topics-of-interest.com . All rights reserved. Hosted by all-inkl.
Contact · Imprint · Privacy

Page generated in 21.47ms.

doomsdaydude.com | dfptutorial.com | information-information.de