1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37
|
Source: yubico-pam
Maintainer: Debian Authentication Maintainers <pkg-auth-maintainers@lists.alioth.debian.org>
Uploaders: Simon Josefsson <simon@josefsson.org>, Klas Lindfors <klas@yubico.com>, Dain Nilsson <dain@yubico.com>
Section: admin
Priority: optional
Build-Depends: debhelper (>= 11),
po-debconf,
chrpath,
pkg-config,
libykclient-dev (>= 2.15),
libpam0g-dev,
libldap2-dev,
libykpers-1-dev (>= 1.8.0),
libyubikey-dev,
libnet-ldap-server-perl
Standards-Version: 4.1.5
Homepage: https://developers.yubico.com/yubico-pam/
Vcs-Browser: https://salsa.debian.org/auth-team/yubico-pam-dpkg
Vcs-Git: https://salsa.debian.org/auth-team/yubico-pam-dpkg.git
Package: libpam-yubico
Architecture: any
Depends: libpam-runtime (>= 1.0.1-6~),
debconf | debconf-2.0,
${shlibs:Depends},
${misc:Depends}
Description: two-factor password and YubiKey OTP PAM module
This package provides the Yubico PAM module. It enables the use of
two-factor authentication, with existing logins and passwords plus
a YubiKey One-Time Password that is validated against an online
validation service. The default is the free YubiCloud, but it is easy
to set up a custom service.
.
A second mode of operation is available using the YubiKey's HMAC-SHA-1
Challenge-Response functionality. This allows for offline validation
using a YubiKey, for example on a laptop computer. However, this only
works for local logins, not for instance SSH logins.
|