You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
This repository has been archived by the owner on Apr 6, 2021. It is now read-only.
Original issue 119 created by tore.lonoy on 2011-11-11T08:27:32.000Z:
Currently google-authenticator cannot be used to authenticate with a single password that consists of the one time key and a personal password.
What I would like to do is this:
Assume username "root"
Assume "root"s username is "test1234" (in /etc/passwd)
Assume next one time key is "abcdabcd", and is always 8 in lenght
SSH to server
Provide username "root"
Provide password "test1234abcdefg"
When 6. is checked with PAM, the google-authenticator will get the last 8 chars if the password provided, and validate it. If auth OK, the module will return OK and "test1234", and hand it over to the next PAM, pam_unix.so.
Original issue 119 created by tore.lonoy on 2011-11-11T08:27:32.000Z:
Currently google-authenticator cannot be used to authenticate with a single password that consists of the one time key and a personal password.
What I would like to do is this:
When 6. is checked with PAM, the google-authenticator will get the last 8 chars if the password provided, and validate it. If auth OK, the module will return OK and "test1234", and hand it over to the next PAM, pam_unix.so.
Yubico (http://yubico.com/) has done this with their yubikey.
The source code to their PAM module is located here: http://code.google.com/p/yubico-pam/
This would enable users to use google-authenticator with e.g. pfsense and PPTP, and just about any other PAM enabled application.
The text was updated successfully, but these errors were encountered: