summaryrefslogtreecommitdiff
path: root/src/init
diff options
context:
space:
mode:
authorChristian Breunig <christian@breunig.cc>2023-12-07 21:30:57 +0100
committerChristian Breunig <christian@breunig.cc>2023-12-08 07:46:21 +0100
commite134dc4171b051d0f98c7151ef32a347bc4f87e2 (patch)
treea82d1acdfa6265bdbd419b519b4433851982862a /src/init
parent8d3e287d028d3fc92256cc86988c06ca5301c7c1 (diff)
downloadvyos-1x-e134dc4171b051d0f98c7151ef32a347bc4f87e2.tar.gz
vyos-1x-e134dc4171b051d0f98c7151ef32a347bc4f87e2.zip
login: T4943: use pam-auth-update to enable/disable Google authenticator
The initial version always enabled Google authenticator (2FA/MFA) support by hardcoding the PAM module for sshd and login. This change only enables the PAM module on demand if any use has 2FA/MFA configured. Enabling the module is done system wide via pam-auth-update by using a predefined template. Can be tested using: set system login user vyos authentication plaintext-password vyos set system login user vyos authentication otp key 'QY735IG5HDHBFHS5W7Y2A4EM274SMT3O' See https://docs.vyos.io/en/latest/configuration/system/login.html for additional details.
Diffstat (limited to 'src/init')
-rwxr-xr-xsrc/init/vyos-router2
1 files changed, 2 insertions, 0 deletions
diff --git a/src/init/vyos-router b/src/init/vyos-router
index 35095afe4..711681a8e 100755
--- a/src/init/vyos-router
+++ b/src/init/vyos-router
@@ -260,6 +260,8 @@ EOF
rm -f /etc/pam_radius_auth.conf
pam-auth-update --disable tacplus-mandatory tacplus-optional
rm -f /etc/tacplus_nss.conf /etc/tacplus_servers
+ # and no Google authenticator for 2FA/MFA
+ pam-auth-update --disable mfa-google-authenticator
# Certain configuration files are re-generated by the configuration
# subsystem and must reside under /etc and can not easily be moved to /run.