File: control

package info (click to toggle)
yubico-pam 2.26-1.1
  • links: PTS, VCS
  • area: main
  • in suites: bookworm, bullseye
  • size: 2,076 kB
  • sloc: sh: 12,129; ansic: 2,434; perl: 117; makefile: 114
file content (37 lines) | stat: -rw-r--r-- 1,503 bytes parent folder | download
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
Source: yubico-pam
Maintainer: Debian Authentication Maintainers <pkg-auth-maintainers@lists.alioth.debian.org>
Uploaders: Simon Josefsson <simon@josefsson.org>, Klas Lindfors <klas@yubico.com>, Dain Nilsson <dain@yubico.com>
Section: admin
Priority: optional
Build-Depends: debhelper (>= 11),
	       po-debconf,
	       chrpath,
	       pkg-config,
	       libykclient-dev (>= 2.15),
	       libpam0g-dev,
	       libldap2-dev,
	       libykpers-1-dev (>= 1.8.0),
	       libyubikey-dev,
	       libnet-ldap-server-perl
Standards-Version: 4.1.5
Homepage: https://developers.yubico.com/yubico-pam/
Vcs-Browser: https://salsa.debian.org/auth-team/yubico-pam-dpkg
Vcs-Git: https://salsa.debian.org/auth-team/yubico-pam-dpkg.git

Package: libpam-yubico
Architecture: any
Depends: libpam-runtime (>= 1.0.1-6~),
	 debconf | debconf-2.0,
	 ${shlibs:Depends},
	 ${misc:Depends}
Description: two-factor password and YubiKey OTP PAM module
 This package provides the Yubico PAM module. It enables the use of
 two-factor authentication, with existing logins and passwords plus
 a YubiKey One-Time Password that is validated against an online
 validation service. The default is the free YubiCloud, but it is easy
 to set up a custom service.
 .
 A second mode of operation is available using the YubiKey's HMAC-SHA-1
 Challenge-Response functionality. This allows for offline validation
 using a YubiKey, for example on a laptop computer. However, this only
 works for local logins, not for instance SSH logins.