<?xml version="1.0" encoding="UTF-8"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en-gb">
<link rel="self" type="application/atom+xml" href="https://forum.yubico.com/feed.php?f=3&amp;t=809" />

<title>Yubico Forum</title>
<subtitle>...visit our web-store at</subtitle>
<link href="https://forum.yubico.com/index.php" />
<updated>2012-05-16T00:46:11+01:00</updated>

<author><name><![CDATA[Yubico Forum]]></name></author>
<id>https://forum.yubico.com/feed.php?f=3&amp;t=809</id>
<entry>
<author><name><![CDATA[bjencks]]></name></author>
<updated>2012-05-16T00:46:11+01:00</updated>
<published>2012-05-16T00:46:11+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=809&amp;p=3096#p3096</id>
<link href="https://forum.yubico.com/viewtopic.php?t=809&amp;p=3096#p3096"/>
<title type="html"><![CDATA[Re: How to avoid hard-coding user identities into the PAM st]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=809&amp;p=3096#p3096"><![CDATA[
The id parameter to the PAM module indicates the API key ID, not the user ID. This ID is returned with the key you get from the &quot;Get API Key&quot; form if you're using the public service, or it's in the &quot;clients&quot; table for your internal validation server, along with the API key.<br /><br />To clarify, when documentation talks about a &quot;client&quot;, that's a piece of software requesting authentication services from the API -- a user submits an OTP to the client, which submits it to the server in a request signed with the API key.<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=1932">bjencks</a> — Wed May 16, 2012 12:46 am</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[CodeGnome]]></name></author>
<updated>2012-05-14T02:30:25+01:00</updated>
<published>2012-05-14T02:30:25+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=809&amp;p=3091#p3091</id>
<link href="https://forum.yubico.com/viewtopic.php?t=809&amp;p=3091#p3091"/>
<title type="html"><![CDATA[How to avoid hard-coding user identities into the PAM stack?]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=809&amp;p=3091#p3091"><![CDATA[
The Yubico PAM Module seems to require changes to the PAM stack for each user that will be authenticated with a YubiKey. Specifically, it seems that each user's client identity must be added to the right PAM configuration file before the user can be authenticated.<br /><br />While it makes sense to add authorized keys to an authentication database such as /etc/yubikey_mappings or ~/.yubico/authorized_yubikeys, it seems like a bad practice to have to edit the PAM stack itself for each individual user. I would definitely like to avoid having to hard-code user identities into the PAM stack this way.<br /><br />So, is it possible to avoid hard-coding the <em>id</em> parameter to the pam_yubico.so module itself? If not, are there any other PAM modules that can leverage YubiKey authentication without hard-coding the stack?<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=2056">CodeGnome</a> — Mon May 14, 2012 2:30 am</p><hr />
]]></content>
</entry>
</feed>