PAM_DUO(8) | System Manager's Manual | PAM_DUO(8) |
pam_duo
— PAM
module for Duo authentication
pam_duo.so
[conf=
⟨FILENAME⟩]
pam_duo
provides secondary authentication
(typically after successful password-based authentication) through the Duo
authentication service.
PAM module configuration options supported:
The INI-format configuration file must have a
“duo
” section with the following
options:
host
ikey
skey
groups
failmode
safe
” (allow access) or
“secure
” (deny access). Default is
“safe
”.pushinfo
no
”.http_proxy
autopush
prompts
fallback_local_ip
send_gecos
An example configuration file:
[duo] host = api-deadbeef.duosecurity.com ikey = SI9F...53RI skey = 4MjR...Q2NmRiM2Q1Y pushinfo = yes autopush = yes
Other authentication restrictions may be implemented using pam_listfile(8), pam_access(8), etc.
A pattern consists of zero or more non-whitespace characters, ‘*’ (a wildcard that matches zero or more characters), or ‘?’ (a wildcard that matches exactly one character).
A pattern-list is a comma-separated list of patterns. Patterns within pattern-lists may be negated by preceding them with an exclamation mark (‘!’). For example, to specify Duo authentication for all users (except those that are also admins), and for guests:
groups = users,!wheel,!*admin
guests
pam_duo
was written by
Duo Security
⟨support@duosecurity.com⟩
When used with OpenSSH's sshd(8), only PAM-based authentication can be protected with this module; pubkey authentication bypasses PAM entirely. OpenSSH's PAM integration also does not honor an interactive pam_conv(3) conversation, prohibiting real-time Duo status messages (such as during voice callback).
September 3, 2010 | Debian |