<feed xmlns='http://www.w3.org/2005/Atom'>
<title>vyos-1x.git/src/pam-configs/mfa-google-authenticator, branch current</title>
<subtitle>VyOS command definitions, scripts, and utilities (mirror of https://github.com/marekm72/vyos-1x.git)
</subtitle>
<id>https://git.amelek.net/marekm72/vyos-1x.git/atom?h=current</id>
<link rel='self' href='https://git.amelek.net/marekm72/vyos-1x.git/atom?h=current'/>
<link rel='alternate' type='text/html' href='https://git.amelek.net/marekm72/vyos-1x.git/'/>
<updated>2023-12-08T06:46:21+00:00</updated>
<entry>
<title>login: T4943: use pam-auth-update to enable/disable Google authenticator</title>
<updated>2023-12-08T06:46:21+00:00</updated>
<author>
<name>Christian Breunig</name>
<email>christian@breunig.cc</email>
</author>
<published>2023-12-07T20:30:57+00:00</published>
<link rel='alternate' type='text/html' href='https://git.amelek.net/marekm72/vyos-1x.git/commit/?id=e134dc4171b051d0f98c7151ef32a347bc4f87e2'/>
<id>urn:sha1:e134dc4171b051d0f98c7151ef32a347bc4f87e2</id>
<content type='text'>
The initial version always enabled Google authenticator (2FA/MFA) support by
hardcoding the PAM module for sshd and login.

This change only enables the PAM module on demand if any use has 2FA/MFA
configured. Enabling the module is done system wide via pam-auth-update by
using a predefined template.

Can be tested using:

set system login user vyos authentication plaintext-password vyos
set system login user vyos authentication otp key 'QY735IG5HDHBFHS5W7Y2A4EM274SMT3O'

See https://docs.vyos.io/en/latest/configuration/system/login.html for additional
details.
</content>
</entry>
</feed>
